In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition to the Boolean retrieval model) in structured databases, especially those in a client-server environ-ment (e.g., web databases). With this model, a search query re-turns top-k tuples according to not just exact matches of selection conditions, but a suitable ranking function. While much research has gone into the design of ranking functions and the efficient pro-cessing of top-k queries, this paper studies a novel problem on the privacy implications of database ranking. The motivation is a novel yet serious privacy leakage we found on real-world web databases which is caused by the ranking func-tion design. Many such databases feature privat...
Little attention has been paid to the measurement of risk to privacy in Database Management Systems,...
2018 Elsevier Inc. A private information retrieval protocol allows a user to retrieve wth data item ...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...
In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition...
Many web databases are only accessible through a proprietary search interface which allows users to ...
Abstract—A large number of web databases are only accessible through proprietary form-like interface...
Privacy concerns in many application domains prevents sharing of data, which limits data mining tech...
Following a period of expedited progress in the capabilities of digital systems, the society begins ...
There has recently been a surge of interest in relational database mining that aims to discover usef...
Many online or local data sources provide powerful querying mechanisms but limited ranking capabilit...
Following a period of expedited progress in the capabilities of digital systems, the society begins ...
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety f...
Part 1: Data Anonymization and ComputationInternational audienceWe consider the problem of a client ...
As organizations struggle with processing vast amounts of information, outsourcing sensitive data to...
Search engines in online communities such as Twitter or Facebook not only return matching posts, but...
Little attention has been paid to the measurement of risk to privacy in Database Management Systems,...
2018 Elsevier Inc. A private information retrieval protocol allows a user to retrieve wth data item ...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...
In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition...
Many web databases are only accessible through a proprietary search interface which allows users to ...
Abstract—A large number of web databases are only accessible through proprietary form-like interface...
Privacy concerns in many application domains prevents sharing of data, which limits data mining tech...
Following a period of expedited progress in the capabilities of digital systems, the society begins ...
There has recently been a surge of interest in relational database mining that aims to discover usef...
Many online or local data sources provide powerful querying mechanisms but limited ranking capabilit...
Following a period of expedited progress in the capabilities of digital systems, the society begins ...
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety f...
Part 1: Data Anonymization and ComputationInternational audienceWe consider the problem of a client ...
As organizations struggle with processing vast amounts of information, outsourcing sensitive data to...
Search engines in online communities such as Twitter or Facebook not only return matching posts, but...
Little attention has been paid to the measurement of risk to privacy in Database Management Systems,...
2018 Elsevier Inc. A private information retrieval protocol allows a user to retrieve wth data item ...
Abstract—URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a mean...