Existing models of privacy assume that the set of data to be held confidential is immutable. Unfortunately, that is often not the case. The need for privacy is balanced against the need to use the data, and the benefits that will accrue from the use of the data. We propose a model to balance privacy and utility of data. This model allows both the data provider and the data user to negotiate both requirements until a satisfactory balance is reached, or one (or both) determine such a balance cannot be reached. Thus, this model enables less than perfect privacy, or less than complete utility, as is appropriate for the particular circumstances under which the dat a was gathered and is being held, and the specific use to which it is to be put
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
We propose a modeling of the problem of privacy-compliant data publishing that captures confidential...
AbstractPrivacy concerns exist whenever sensitive data relating to people is collected. Finding a wa...
This paper presents and model a novel general framework for privacy aware collaborative information ...
Abstract: In order to protect the privacy of individuals in sensitive data that has been released fo...
Due to the wide deployment of Internet and information technology, the ever growing privacy concern ...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
International audiencePersonal data is a valuable asset for service providers. To collect such data,...
In this information age, data and knowledge extracted by data mining techniques represent a key asse...
Prof. Johannes Gehrke, Committee Chair. Prof. Eva Tardos, Committee Member. Prof. Joseph Halpern, ...
Summary: Differential privacy allows quantifying privacy loss resulting from accession of sensitive ...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and ava...
Data describing human activities are an important source of knowledge useful for understanding indiv...
Abstract – The sharing of data is often beneficial in data mining applications. It has been proven u...
Social media, web search logs and online purchases are only some of the sources used my private and ...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
We propose a modeling of the problem of privacy-compliant data publishing that captures confidential...
AbstractPrivacy concerns exist whenever sensitive data relating to people is collected. Finding a wa...
This paper presents and model a novel general framework for privacy aware collaborative information ...
Abstract: In order to protect the privacy of individuals in sensitive data that has been released fo...
Due to the wide deployment of Internet and information technology, the ever growing privacy concern ...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
International audiencePersonal data is a valuable asset for service providers. To collect such data,...
In this information age, data and knowledge extracted by data mining techniques represent a key asse...
Prof. Johannes Gehrke, Committee Chair. Prof. Eva Tardos, Committee Member. Prof. Joseph Halpern, ...
Summary: Differential privacy allows quantifying privacy loss resulting from accession of sensitive ...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and ava...
Data describing human activities are an important source of knowledge useful for understanding indiv...
Abstract – The sharing of data is often beneficial in data mining applications. It has been proven u...
Social media, web search logs and online purchases are only some of the sources used my private and ...
Sharing data is gaining importance in recent years due to proliferation of social media and a growin...
We propose a modeling of the problem of privacy-compliant data publishing that captures confidential...
AbstractPrivacy concerns exist whenever sensitive data relating to people is collected. Finding a wa...