نتایج جستجو برای: data sanitization

تعداد نتایج: 2410486  

2010
Richard Chow Ji Fang Philippe Golle Jessica Staddon

The privacy dangers of data proliferation on the Web are well-known. Information on the Web has facilitated the deanonymization of anonymous bloggers, the de-sanitization of government records and the identification of individuals based on search engine queries. What has received less attention is Web-mining in support of privacy. In this position paper we argue that the very ability of Web dat...

2011
Feng Bao Robert H. Deng Xuhua Ding Junzuo Lai Yunlei Zhao

At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegate, at any time, the power of sanitization to possibly several entities who can modify predetermined parts of the message and generate a new signature on the sanitized message without inter...

Journal: :Sustainable Cities and Society 2022

In this paper we propose ConvXSS, a novel deep learning approach for the detection of XSS and code injection attacks, followed by context-based sanitization malicious if model detects any in application. Firstly, briefly discuss attacks that might pose threat to sustainable smart cities. Along with this, various approaches proposed previously alleviation these their respective limitations. Then...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2016

2014
Veena Vasudevan Ansamma John M. M. Douglass G. D. Cliffford A. Reisner W. J. Long G. B. Moody V. T. Chakaravarthy H. Gupta P. Roy

Information is essential for all purpose of activities such as research, business decision making, etc. In this internet technology age there is no scarcity of information also. But if the information reveals the identity of a person or if it discloses confidential matters, then such information is a serious threat to privacy. So before publishing or sharing documents, the sensitive information...

2015
Deepika Shrivastava Rahul Shukla

This thesis is basically designed for privacy preserving utility mining using sanitization approach. In this work itemsets are provided safety using an approach , firstly we will calculate the utility of all itemsets as the product of item cost and its number of transactions, then we will set a threshold utility which will be the average of max and min utility. Now, we will try to reduce the di...

2013
Matthias Keil Peter Thiemann

Dependency analysis is a program analysis that determinespotential data flow between program points. While it is not asecurity analysis per se, it is a viable basis for investigatingdata integrity, for ensuring confidentiality, and for guaran-teeing sanitization. A noninterference property can be statedand proved for the dependency analysis.We have designed and implement...

Journal: :Inf. Sci. 2014
David Sánchez Montserrat Batet Alexandre Viejo

Traditionally, redaction has been the method chosen to mitigate the privacy issues related to the declassification of textual documents containing sensitive data. This process is based on removing sensitive words in the documents prior to their release and has the undesired side effect of severely reducing the utility of the content. Document sanitization is a recent alternative to redaction, w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید