نتایج جستجو برای: privacy preservation

تعداد نتایج: 116916  

Journal: :JSW 2012
Yun Pan Xiao-ling Zhu Ting-gui Chen

The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...

2008
Ming Hua Jian Pei

As a serious concern in data publishing and analysis, privacy preserving data processing has received a lot of attention. Privacy preservation often leads to information loss. Consequently, we want to minimize utility loss as long as the privacy is preserved. In this chapter, we survey the utility-based privacy preservation methods systematically. We first briefly discuss the privacy models and...

Journal: :Proceedings of the VLDB Endowment 2012

Journal: :Computer Communications 2016
Wenlin Han Yang Xiao

Vehicle to grid (V2G) network is a crucial part of smart grid. An electric vehicle (EV) in a V2G network uses electricity instead of gasoline, and this benefits the environment and helps mitigate the energy crisis. By using its battery capacity, the vehicle can serve temporarily as a distributed energy storage system to mitigate peak load of the power grid. However, the two-way communication an...

2009
Xintao Wu Xiaowei Ying Kun Liu Lei Chen

Social networks have received dramatic interest in research and development. In this chapter, we survey the very recent research development on privacy-preserving publishing of graphs and social network data. We categorize the state-of-the-art anonymization methods on simple graphs in three main categories: K-anonymity based privacy preservation via edge modification, probabilistic privacy pres...

2012
Depeng Li Zeyar Aung Srinivas Sampalli Abel Sanchez

Privacy preservation is a crucial issue for smart grid security. With more and more group applications, data and appliances proliferated in smart grid, electricity customers are faced with extended privacy risks. Meanwhile, the natures of smart grid—such as limitation in computation power of smart meters, requirement to be highly reliable, and transformation from a private system to an open one...

Journal: :Procedia Computer Science 2018

Journal: :ICST Transactions on Scalable Information Systems 2023

Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers privacy abuse. Current record management systems have difficulties achieving protection sensitive a secure, transparent, decentralized trustless environment. The Blockchain technology is nascent promising that facilitates data sharing access enables use smart...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید