نتایج جستجو برای: data sanitization

تعداد نتایج: 2410486  

Journal: :Big data mining and analytics 2022

Minable data publication is ubiquitous since it beneficial to sharing/trading among commercial companies and further facilitates the development of data-driven tasks. Unfortunately, minable often implemented by publishers with limited privacy concerns such that published dataset malicious entities. It prohibits may contain sensitive information. Thus, urgently demanded present some approaches t...

Journal: :Computer and Information Science 2008
R. R. Rajalaxmi A. M. Natarajan

Data mining plays a vital role in today’s information world wherein it has been widely applied in various business organizations. The current trend in business collaboration demands the need to share data or mined results to gain mutual benefit. However it has also raised a potential threat of revealing sensitive information when releasing data. Data sanitization is the process to conceal the s...

2014
WENTIAN LU

PRIVACY-PRESERVING SANITIZATION IN DATA SHARING

2015
Jeffrey Medsger Avinash Srinivasan Jie Wu

Current enterprise drive sanitization techniques employ little or no intelligence to determine if the area being sanitized, with data overwriting, actually contains sensitive resident data. All data blocks in the target area are sanitized, utilizing bruteforce sanitization techniques of one to several wipe passes. In reality, a significant number of drives needing sanitization may contain areas...

2008
Cynthia Dwork Moni Naor Omer Reingold Guy N. Rothblum Salil Vadhan

We consider private data analysis in the setting in which a trusted and trustworthy curator, having obtained a large data set containing private information, releases to the public a “sanitization” of the data set that simultaneously protects the privacy of the individual contributors of data and offers utility to the data analyst. The sanitization may be in the form of an arbitrary data struct...

2013
Fabiano C. Botelho Philip Shilane Nitin Garg Windsor W. Hsu

Sanitization is the process of securely erasing sensitive data from a storage system, effectively restoring the system to a state as if the sensitive data had never been stored. Depending on the threat model, sanitization could require erasing all unreferenced blocks. This is particularly challenging in deduplicated storage systems because each piece of data on the physical media could be refer...

Journal: :Eng. Appl. of AI 2017
David Sánchez Montserrat Batet

Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much of these data are texts (e.g., emails, messages posted in social media, healthcare outcomes, etc.) that, because of their...

2011
Michael Yung Chung Wei Laura M. Grupp Frederick E. Spada Steven Swanson

Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-understood for hard drives, flash-based solid state disks have a very different internal architecture, so it is unclear whether hard drive techniques will work for SSDs as well. We empirically evaluate the effectiveness of ...

2003
Stanley R. M. Oliveira Osmar R. Zaïane

In this paper, we address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting actionable knowledge for strategic decisions, but at the same time not losing the great benefit of association rule mining. To accomplish that, we introduce a new, efficient one-scan algorithm that meets privacy protection and accuracy in association rule minin...

2016

We present a codeand input-sensitive sanitization synthesis approach for repairing string vulnerabilities that are common in web applications. The synthesized sanitization patch modifies the user input in an optimal way while guaranteeing that the repaired web application is not vulnerable. Given a web application, an input pattern and an attack pattern, we use automata-based static string anal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید