Sciweavers

2272 search results - page 83 / 455
» Provable Data Privacy
Sort
View
180
Voted
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 23 days ago
Privacy Preserving OLAP
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas
DASFAA
2004
IEEE
164views Database» more  DASFAA 2004»
15 years 4 months ago
On Addressing Efficiency Concerns in Privacy-Preserving Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage users to...
Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa
TDP
2010
88views more  TDP 2010»
14 years 7 months ago
P-Sensitive K-Anonymity with Generalization Constraints
Numerous privacy models based on the kanonymity property and extending the kanonymity model have been introduced in the last few years in data privacy re search: ldiversity, psen...
Alina Campan, Traian Marius Truta, Nicholas Cooper
92
Voted
DIM
2008
ACM
15 years 2 months ago
Proposal of privacy policy matching engine
We propose a system called "Privacy Policy Matching Engine", which enables a matching of a user's intention to provide his/her identity-related data and enterprises...
Takao Kojima, Yukio Itakura
85
Voted
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
15 years 2 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li