Fragmentation in presence of data dependencies
Fragmentation has been recently proposed as a promising approach to protect the
confidentiality of sensitive associations whenever data need to undergo external release or …
confidentiality of sensitive associations whenever data need to undergo external release or …
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
Efficient privacy-preserving algorithms are used in internet of things (IoT) applications,
virtualization and edge computing environments to decrease the high data disclosure risk …
virtualization and edge computing environments to decrease the high data disclosure risk …
Loose associations to increase utility in data publishing 1
Data fragmentation has been proposed as a solution for protecting the confidentiality of
sensitive associations when releasing data for publishing or external storage. To enrich the …
sensitive associations when releasing data for publishing or external storage. To enrich the …
Extending loose associations to multiple fragments
Data fragmentation has been proposed as a solution for protecting the confidentiality of
sensitive associations when publishing data at external servers. To enrich the utility of the …
sensitive associations when publishing data at external servers. To enrich the utility of the …
[LIVRE][B] Protecting privacy in data release
G Livraga - 2015 - Springer
Data sharing and dissemination play a key role in our information society. Not only do they
prove to be advantageous to the involved parties, but they can also be fruitful to the society …
prove to be advantageous to the involved parties, but they can also be fruitful to the society …
Privacy disclosure and preservation in learning with multi-relational databases
There has recently been a surge of interest in relational database mining that aims to
discover useful patterns across multiple interlinked database relations. It is crucial for a …
discover useful patterns across multiple interlinked database relations. It is crucial for a …
Identifying and preventing data leakage in multi-relational classification
Relational database mining, where data are mined across multiple relations, is increasingly
commonplace. When considering a complex database schema, it becomes difficult to …
commonplace. When considering a complex database schema, it becomes difficult to …
Learning in the presence of large fluctuations: a study of aggregation and correlation
Consider a scenario where one aims to learn models from data being characterized by very
large fluctuations that are neither attributable to noise nor outliers. This may be the case, for …
large fluctuations that are neither attributable to noise nor outliers. This may be the case, for …
[PDF][PDF] Provable and practical security for database outsourcing
MC Huber - 2016 - core.ac.uk
Provable security is one of the greatest achievements of modern cryptography. When
proving the security of a cryptographic scheme, its security properties are reduced to …
proving the security of a cryptographic scheme, its security properties are reduced to …
[PDF][PDF] Privacy leakage in multi-relational learning via unwanted classification models.
Multirelational classification algorithms aim to discover patterns across multiple interlinked
tables in a relational database. However, when considering a complex database schema, it …
tables in a relational database. However, when considering a complex database schema, it …