Sciweavers

654 search results - page 32 / 131
» Privacy protection for RFID data
Sort
View
JIDM
2010
122views more  JIDM 2010»
14 years 8 months ago
Revisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering w...
Stanley R. M. Oliveira, Osmar R. Zaïane
92
Voted
EUROSEC
2010
ACM
15 years 3 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
101
Voted
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
15 years 10 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton
CIKM
2008
Springer
15 years 2 days ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
GVD
2009
108views Database» more  GVD 2009»
14 years 7 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag