Sciweavers

654 search results - page 78 / 131
» Privacy protection for RFID data
Sort
View
111
Voted
PAKDD
2010
ACM
275views Data Mining» more  PAKDD 2010»
15 years 2 months ago
Anonymizing Transaction Data by Integrating Suppression and Generalization
Abstract. Privacy protection in publishing transaction data is an important problem. A key feature of transaction data is the extreme sparsity, which renders any single technique i...
Junqiang Liu, Ke Wang
CSUR
2010
373views more  CSUR 2010»
14 years 7 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang
61
Voted
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Integrated Health Log: Share Multimedia Patient Data
The Integrated Health Log demonstrator shows how multimedia can be used in collaborative settings in healthcare. Patient data can be shared annotated discussed and processed by me...
Rogier Brussee, Paul Porskamp, Leon van den Oord, ...
80
Voted
SPW
2004
Springer
15 years 3 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
62
Voted
COCOA
2008
Springer
15 years 7 hour ago
Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries
A popular model for protecting privacy when person-specific data is released is k-anonymity. A dataset is k-anonymous if each record is identical to at least (k - 1) other records ...
Rhonda Chaytor, Patricia A. Evans, Todd Wareham