©2019 Copyright held by the author(s). Computing-intensive experiences in modern sciences have become increasingly data-driven illustrating perfectly the Big-Data era’s challenges. These experiences are usually specified and enacted in the form of workflows that would need to manage (i.e., read, write, store, and retrieve) sensitive data like persons’ past diseases and treatments. While there is an active research body on how to protect sensitive data by, for instance, anonymizing datasets, there is a limited number of approaches that would assist scientists identifying the datasets, generated by the workflows, that need to be anonymized along with setting the anonymization degree that must be met. We present in this paper a preliminary for...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
© 2016 IEEE. Institutions in higher education generate terabytesof data that has great value to shap...
Recent advances in hardware, software, computing, and communication technologies have enabled the de...
© 2016 Elsevier B.V. All rights reserved. Business enterprises adopt cloud integration services to i...
Health data mining is an emerging research direction. High-quality health data mining results rely o...
© 2015 IEEE. In the last decade, several approaches concerning private data release for data mining ...
© 2017, Springer-Verlag London Ltd., part of Springer Nature. Various organizations collect data abo...
IEEE With increasing adoption of cloud services in the e-market, collaboration between stakeholders ...
© 2017 IEEE. The data in higher educational institutions come from the interaction of students with ...
© 2015 IEEE. Due to the proliferation of high-speed mobile networks and powerful smartphones featuri...
© 2015 IEEE. There has been a tremendous growth in health data collection since the development of E...
Most of privacy protection studies for textual data focus on removing explicit sensitive identifiers...
A good understanding of the underlying mechanisms that govern identities on the Web is a key aspect ...
© 2017, Springer International Publishing AG. The Internet of Things (IoT) emerged as a paradigm in ...
As the ease with which any data are collected and transmitted increases, more privacy concerns arise...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
© 2016 IEEE. Institutions in higher education generate terabytesof data that has great value to shap...
Recent advances in hardware, software, computing, and communication technologies have enabled the de...
© 2016 Elsevier B.V. All rights reserved. Business enterprises adopt cloud integration services to i...
Health data mining is an emerging research direction. High-quality health data mining results rely o...
© 2015 IEEE. In the last decade, several approaches concerning private data release for data mining ...
© 2017, Springer-Verlag London Ltd., part of Springer Nature. Various organizations collect data abo...
IEEE With increasing adoption of cloud services in the e-market, collaboration between stakeholders ...
© 2017 IEEE. The data in higher educational institutions come from the interaction of students with ...
© 2015 IEEE. Due to the proliferation of high-speed mobile networks and powerful smartphones featuri...
© 2015 IEEE. There has been a tremendous growth in health data collection since the development of E...
Most of privacy protection studies for textual data focus on removing explicit sensitive identifiers...
A good understanding of the underlying mechanisms that govern identities on the Web is a key aspect ...
© 2017, Springer International Publishing AG. The Internet of Things (IoT) emerged as a paradigm in ...
As the ease with which any data are collected and transmitted increases, more privacy concerns arise...
© 2019 Association for Computing Machinery. Data Integrity (DI) is the ability to ensure that a data...
© 2016 IEEE. Institutions in higher education generate terabytesof data that has great value to shap...
Recent advances in hardware, software, computing, and communication technologies have enabled the de...