depreciate 发表于 2025-3-25 06:12:16

Conference proceedings 2010lly due to the growing proliferation of data in open environments as a result of emerging data services such as cloud computing, location based services, and health-related services. Con?dentiality is the main driving force behind the - search that covers topics such as privacy enhancing technologie

GLUT 发表于 2025-3-25 07:52:48

Differentially Private Data Release through Multidimensional Partitioningoning strategies including a baseline cell-based partitioning and an innovative kd-tree based partitioning. In addition to providing formal proofs for differential privacy and usefulness guarantees for linear distributive queries , we also present a set of experimental results and demonstrate the feasibility and performance of our method.

易碎 发表于 2025-3-25 12:59:53

On-the-Fly Hierarchies for Numerical Attributes in Data Anonymizationaset. Due to this characteristic of the hierarchies created on-the-fly for quasi-identifier numerical attributes, the quality of the microdata anonymized through generalization based on these hierarchies is well preserved, and the information loss in the anonymization process remains in reasonable bounds, as proved experimentally.

brassy 发表于 2025-3-25 16:44:00

eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Losinherits advantages and avoids disadvantages of existing k-anonymity-based techniques. Experimental results with real-world datasets show that eM. is superior to other k-anonymity algorithms by an order of magnitude.

Digitalis 发表于 2025-3-25 21:04:01

A Formal P3P Semantics for Composite Services to its flexibility and may have internal semantic inconsistencies due to a lack of clear semantics. Therefore, we enhance P3P to be able to support composite services, propose a formal semantic for P3P to preserve semantic consistency, and also define combining methods to obtain the privacy policies of composite services.

concentrate 发表于 2025-3-26 01:17:13

http://reply.papertrans.cn/87/8633/863276/863276_26.png

向外 发表于 2025-3-26 08:04:52

http://reply.papertrans.cn/87/8633/863276/863276_27.png

群居动物 发表于 2025-3-26 10:40:55

eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Losracted much research and k-anonymity is a well-known and promising model invented for PP. Based on the k-anonymity model, this paper introduces a novel and efficient member migration algorithm, called eM., to ensure k-anonymity and avoid information loss as much as possible, which is the crucial wea

invulnerable 发表于 2025-3-26 15:18:53

http://reply.papertrans.cn/87/8633/863276/863276_29.png

祸害隐伏 发表于 2025-3-26 20:50:55

Privacy Preserving Event Driven Integration for Interoperating Social and Health Systemsle IT systems. In most cases this cooperation today is handled ”manually” via document exchange (by email, post, or fax) and in a point-to-point fashion. One of the reasons that makes it difficult to implement an integrated solution is that of privacy, as health information is often sensitive and th
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Secure Data Management; 7th VLDB Workshop, S Willem Jonker,Milan Petković Conference proceedings 2010 Springer-Verlag Berlin Heidelberg 201