The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Masks: Bringing Anonymity and Personalization Together
IEEE Security and Privacy
Cover story: they know where you are
IEEE Spectrum
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Privacy preserving data obfuscation for inherently clustered data
International Journal of Information and Computer Security
Random orthogonal matrix masking methodology for microdata release
International Journal of Information and Computer Security
Detection and surveillance technologies: privacy-related requirements and protection schemes
International Journal of Electronic Security and Digital Forensics
IDEAL '08 Proceedings of the 9th International Conference on Intelligent Data Engineering and Automated Learning
Brief paper: Experience-consistent modeling: Regression and classification problems
Automatica (Journal of IFAC)
Analysis of Program Obfuscation Schemes with Variable Encoding Technique
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Letters: A neural network approach for data masking
Neurocomputing
WISS'10 Proceedings of the 2010 international conference on Web information systems engineering
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Symbolic finite state transducers: algorithms and applications
POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A client-centric ASM-based approach to identity management in cloud computing
ER'12 Proceedings of the 2012 international conference on Advances in Conceptual Modeling
An Approach to Data Confidentiality Protection in Cloud Environments
International Journal of Web Services Research
Hi-index | 0.00 |
In some domains, the need for data privacy and data sharing conflict. Data obfuscation addresses this dilemma by extending several existing technologies and defining obfuscation properties that quantify the technologies' usefulness and privacy preservation.