Sciweavers

2272 search results - page 49 / 455
» Provable Data Privacy
Sort
View
103
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...
85
Voted
DMIN
2007
85views Data Mining» more  DMIN 2007»
15 years 1 months ago
A Clustering Approach for Achieving Data Privacy
Abstract — New privacy regulations together with everincreasing data availability and computational power have created a huge interest in data privacy research. One major researc...
Alina Campan, Traian Marius Truta, John Miller, Ra...
117
Voted
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 19 days ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
84
Voted
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
16 years 19 days ago
State-of-the-art in privacy preserving data mining
We provide here an overview of the new and rapidly emerging research area of privacy preserving data mining. We also propose a classification hierarchy that sets the basis for ana...
Vassilios S. Verykios, Elisa Bertino, Igor Nai Fov...
94
Voted
SDMW
2004
Springer
15 years 5 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan