A survey of query log privacy-enhancing techniques from a policy perspective
نویسندگان
چکیده
منابع مشابه
Privacy Enhancing Techniques: A Survey and Classification
This chapter provides a survey of privacy enhancing techniques and discusses their effect using a scenario in which a charged location based service is used. We introduce four protection levels and discuss an assessment of privacy enhancing techniques according to these protection levels.
متن کاملPrivacy Preserving Web Query Log Publishing: A Survey on Anonymization Techniques
Releasing Web query logs which contain valuable information for research or marketing, can breach the privacy of search engine users. Therefore rendering query logs to limit linking a query to an individual while preserving the data usefulness for analysis, is an important research problem. This survey provides an overview and discussion on the recent studies on this direction.
متن کاملA Survey of Query Auditing Techniques for Data Privacy
17.1 Introduction This chapter is a survey of query auditing techniques for detecting and preventing disclosures in a database containing private data. Informally, auditing is the process of examining past actions to check whether they were in conformance with official policies. In the context of database systems with specific data disclosure policies, auditing is the process of examining queri...
متن کاملA Semantic Perspective on Query Log Analysis
We present our views on the CLEF log file analysis task. We argue for a task definition that focuses on the semantic enrichment of query logs. In addition, we discuss how additional information about the context in which queries are being made could further our understanding of users’ information seeking and how to better facilitate this process.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on the Web
سال: 2008
ISSN: 1559-1131,1559-114X
DOI: 10.1145/1409220.1409222