Effective Slicing: A Generalization of Full and Relevant Slicing

نویسنده

  • Anne Mulhern
چکیده

? x x = 2; if (y == 2) y = 2; effective slice{2,3} in forming correct unions of slices potential dependences must be taken into account only when the potential statement is executed in some other slice effective slicing algorithm a relevant slicing algorithm abstracted over a set, !, of potential statements: effective(P, ", !) effective(P, ", ∅) = full(P, ") effective(P, ", P) = relevant(P, ") dynamic slicing algorithm a function of two arguments: a program, P an initial state," examples: full(P, "), relevant(P, ") ∪ ✓ 1 1/⊥ 3 ✓ ✓ ✓ ✓ ✓

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Approach to Privacy Preserving Data Publishing Using Slicing Technique

Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that generalization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separatio...

متن کامل

Perpetuate Data Report based on the Slicing Approach

Anonymization is a technique preserving privacy on micro data, we have so many anonymization techniques like generalization, bucketization all these are privacy preserving on sensitive data, with these techniques there is no security for the data, generalization loses the important data and bucketization is not preventing membership disclosure and does not apply on the data for clear separation...

متن کامل

Dynamic Approach for Secure Data Publishing in Mining

More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quantity of in sequence, particularly for high-dimensional data. Bucketization, on the other offer, does not put off membership revelation and does not apply for data that do not have a...

متن کامل

Efficient Techniques for Preserving Microdata Using Slicing

Privacy preserving publishing is the kind of techniques to apply privacy to collected vast amount of data. One of the recent problem prevailing is in the field of data publication. The data often consist of personally identifiable information so releasing such data consists of privacy problem. Several anonymization techniques such as generalization and bucketization have been designed for priva...

متن کامل

Segmenting: A New-Fangled Advance to Isolation Conserving Facts Distributing

Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of “quasiidentifier" attributes such as ZIP code and birthdate. Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving micro data publishing. Recent work has shown th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008