Sciweavers

2272 search results - page 233 / 455
» Provable Data Privacy
Sort
View
GLOBECOM
2006
IEEE
15 years 7 months ago
Secure Aggregation in Large Scale Overlay Networks
Overlay networks have been very useful in solving large scale data dissemination problems. In this paper, we consider the case of data gathering which is the inverse of disseminat...
Waseem Ahmad, Ashfaq A. Khokhar
ISI
2006
Springer
15 years 26 days ago
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications
This work investigates the accuracy and efficiency tradeoffs between centralized and collective (distributed) algorithms for (i) sampling, and (ii) n-way data analysis techniques i...
Evrim Acar, Seyit Ahmet Çamtepe, Bülen...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 1 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
16 years 2 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa
ICDE
2003
IEEE
119views Database» more  ICDE 2003»
16 years 2 months ago
Implementing P3P Using Database Technology
Platform for Privacy Preferences (P3P) is the most significant effort currently underway to enable web users to gain control over their private information. P3P provides mechanism...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...