privacy

Privacy in Data Mining

Publication Type:

Book Chapter

Authors:

Vicenç Torra

Source:

Data Mining and Knowledge Discovery Handbook, Springer, p.687-716 (2010)

Semantic Microaggregation for the Anonymization of Query Logs

Publication Type:

Conference Paper

Source:

PSD 2010, Springer, Volume 6344, Greece, p.127-137 (2010)

Using Classification Methods to Evaluate Attribute Disclosure Risks

Publication Type:

Conference Paper

Source:

MDAI 2010, Springer, Volume 6408, France, p.277-286 (2010)

Distributed Privacy-Preserving Methods for Statistical Disclosure Control

Publication Type:

Conference Paper

Source:

Int. Workshop on Data Privacy Management (DPM'09), Springer, Volume 5939, France, p.33-47 (2010)

Classifying data from protected statistical datasets

Publication Type:

Journal Article

Source:

Computer and Security, Volume 29, Issue 8, p.875-890 (2010)

Information loss for synthetic data through fuzzy clustering

Publication Type:

Journal Article

Source:

Int. J. of Uncertainty, Fuzziness and Knowledge-Based Systems, World Scientific , Volume 18, Issue 1, p.25-37 (2010)

Privacy-preserving data-mining through micro-aggregation for web-based e-commerce

Publication Type:

Journal Article

Source:

Internet Research, Emerald Group Publishing Limited, Volume 20, Issue 3, p.366-384 (2010)

URL:

http://dx.doi.org/10.1108/10662241011050759

Towards Semantic Microaggregation of Categorical Data for Confidential Documents

Publication Type:

Conference Proceedings

Source:

Modeling Decisions for Artificial Intelligence, MDAI 2010, Springer, Volume 6408, Perpignan, France, p.266-276 (2010)

URL:

http://www.springerlink.com/content/f41402862155w6t4/

Keywords:

Web indexing task; classification task; frequency term vector; k-anonymity preservation; privacy preserving information retrieval; semantic microaggregation; Internet; data privacy; information retrieval; pattern classification; vectors

Abstract:

In the data privacy context, specifically, in statistical disclosure control techniques, microaggregation is a well-known microdata protection method, ensuring the confidentiality of each individual. In this paper, we propose a new approach of microaggregation to deal with semantic sets of categorical data, like text documents. This method relies on the WordNet framework that provides complete semantic relationship taxonomy between words. Therefore, this extension aims ensure the confidentiality of text documents, but at the same time, it should preserve the general meaning. We apply some measures to evaluate the quality of the protection method relying on information loss.

Generation of Synthetic Data by means of Fuzzy c-Regression

Publication Type:

Conference Paper

Source:

2009 IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2009, IEEE, Jeju Island, Korea, p.1145-1150 (2009)

ISBN:

978-1-4244-3597-5

A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor

Publication Type:

Conference Paper

Source:

24th IFIP TC-11 International Information Security Conference (SEC2009), Springer Boston, Volume 297/2009, Cyprus, p.164-175 (2009)

ISBN:

978-3-642-01243-3

URL:

http://www.springerlink.com/content/l12k23678011l1t2

Keywords:

privacy; anonymity; Tor

Abstract:

Web browsers are becoming the universal interface to reach
applications and services related with these systems. Different
browsing contexts may be required in order to reach them, e.g., use
of VPN tunnels, corporate proxies, anonymisers, etc. By browsing
\emph{context} we mean how the user browsers the Web, including
mainly the concrete configuration of its browser. When the context
of the browser changes, its security requirements also change. In
this work, we present the use of authorisation policies to
automatise the process of controlling the resources of a Web browser
when its context changes. The objective of our proposal is oriented
towards easing the adaptation to the security requirements of the
new context and enforce them in the browser without the need for
user intervention. We present a concrete application of our work as
a \emph{plug-in} for the adaption of security requirements in
Mozilla/Firefox browser when a context of anonymous navigation
through the Tor network is enabled.

Syndicate content