Fragmentation in presence of data dependencies

SDC Di Vimercati, S Foresti, S Jajodia… - … on Dependable and …, 2014 - ieeexplore.ieee.org
Fragmentation has been recently proposed as a promising approach to protect the
confidentiality of sensitive associations whenever data need to undergo external release or …

K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing

C Ling, W Zhang, H He - Cluster Computing, 2023 - Springer
Efficient privacy-preserving algorithms are used in internet of things (IoT) applications,
virtualization and edge computing environments to decrease the high data disclosure risk …

Loose associations to increase utility in data publishing 1

S De Capitani di Vimercati, S Foresti… - Journal of …, 2015 - content.iospress.com
Data fragmentation has been proposed as a solution for protecting the confidentiality of
sensitive associations when releasing data for publishing or external storage. To enrich the …

Extending loose associations to multiple fragments

S De Capitani di Vimercati, S Foresti, S Jajodia… - Data and Applications …, 2013 - Springer
Data fragmentation has been proposed as a solution for protecting the confidentiality of
sensitive associations when publishing data at external servers. To enrich the utility of the …

[LIVRE][B] Protecting privacy in data release

G Livraga - 2015 - Springer
Data sharing and dissemination play a key role in our information society. Not only do they
prove to be advantageous to the involved parties, but they can also be fruitful to the society …

Privacy disclosure and preservation in learning with multi-relational databases

H Guo, HL Viktor, E Paquet - Journal of Computing Science and …, 2011 - koreascience.kr
There has recently been a surge of interest in relational database mining that aims to
discover useful patterns across multiple interlinked database relations. It is crucial for a …

Identifying and preventing data leakage in multi-relational classification

H Guo, HL Viktor, E Paquet - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Relational database mining, where data are mined across multiple relations, is increasingly
commonplace. When considering a complex database schema, it becomes difficult to …

Learning in the presence of large fluctuations: a study of aggregation and correlation

E Paquet, HL Viktor, H Guo - New Frontiers in Mining Complex Patterns …, 2013 - Springer
Consider a scenario where one aims to learn models from data being characterized by very
large fluctuations that are neither attributable to noise nor outliers. This may be the case, for …

[PDF][PDF] Provable and practical security for database outsourcing

MC Huber - 2016 - core.ac.uk
Provable security is one of the greatest achievements of modern cryptography. When
proving the security of a cryptographic scheme, its security properties are reduced to …

[PDF][PDF] Privacy leakage in multi-relational learning via unwanted classification models.

H Guo, HL Viktor, E Paquet - CASCON, 2011 - researchgate.net
Multirelational classification algorithms aim to discover patterns across multiple interlinked
tables in a relational database. However, when considering a complex database schema, it …