Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient's medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the dat...
Abstract. With the advent of cloud computing there is an increased interest in outsourcing an organi...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
In this paper, we consider a scenario where there are a group of clients and a database server, and ...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Abstract: Suppose Alice owns a k-anonymous database and needs to determine whether her database, whe...
Suppose that Alice, owner of a k-anonymous database, needs to determine whether her database, when a...
Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with ...
The current trend in the application space towards systems of loosely coupled and dynamically bound ...
Anonymization means to remove personal identifier or converted into non readable form by human to pr...
In order to update k-anonymous and confidential database, the suppression based and generalization b...
Abstract — We study the distributed k-anonymous data collec-tion problem: a data collector (e.g., a ...
This paper investigates how Boolean reasoning can be used to make the records in a database anonymou...
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person...
Abstract. With the advent of cloud computing there is an increased interest in outsourcing an organi...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
In this paper, we consider a scenario where there are a group of clients and a database server, and ...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Abstract: Suppose Alice owns a k-anonymous database and needs to determine whether her database, whe...
Suppose that Alice, owner of a k-anonymous database, needs to determine whether her database, when a...
Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with ...
The current trend in the application space towards systems of loosely coupled and dynamically bound ...
Anonymization means to remove personal identifier or converted into non readable form by human to pr...
In order to update k-anonymous and confidential database, the suppression based and generalization b...
Abstract — We study the distributed k-anonymous data collec-tion problem: a data collector (e.g., a ...
This paper investigates how Boolean reasoning can be used to make the records in a database anonymou...
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person...
Abstract. With the advent of cloud computing there is an increased interest in outsourcing an organi...
The concept of k-anonymity has received considerable attention due to the need of several organizati...
In this paper, we consider a scenario where there are a group of clients and a database server, and ...