Sciweavers

2272 search results - page 206 / 455
» Provable Data Privacy
Sort
View
110
Voted
PDP
2008
IEEE
15 years 7 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
105
Voted
CCGRID
2004
IEEE
15 years 4 months ago
Privacy-preserving association rule mining in large-scale distributed systems
Data privacy is a major concern that threatens the widespread deployment of Data Grids in domains such as health-care and finance. We propose a unique approach for obtaining knowl...
Assaf Schuster, Ran Wolff, Bobi Gilburd
115
Voted
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 7 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
106
Voted
PET
2004
Springer
15 years 6 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
104
Voted
DBSEC
2010
101views Database» more  DBSEC 2010»
15 years 2 months ago
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the specific query data to the server. Computational Private Informa...
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi