8,453 Hits in 2.1 sec

Disclosure detection over data streams in database publishing

Deming Dou, Stéphane Coulondre
2011 Proceedings of the 2011 Joint EDBT/ICDT Ph.D. Workshop on - PhD '11  
In this paper, we focus on disclosure detection related to database publishing, and present a novel approach of detecting privacy leakages over data streams on querying databases by using dynamic pattern  ...  , quite a few techniques can be seen among literatures for detecting information disclosure in the process of data transmission.  ...  In this paper, we focused on disclosure detection with respect to database publishing and proposed a process detection method over relational data streams using dynamic pattern matching and data stream  ... 
doi:10.1145/1966874.1966876 dblp:conf/edbt/DouC11 fatcat:elnddda6gndwdbznm6o6szajxy

Context-aware disclosure of health sensor data

Jatinder Singh, Pedro Brandao, Jean Bacon
2010 Proceedings of the 4th International ICST Conference on Pervasive Computing Technologies for Healthcare  
This paper illustrates how a data control middleware can regulate sensor data flows, controlling the information disclosed in accordance with circumstance.  ...  However, it is also important to control access to live data streams, such as those from sensor devices--especially as healthcare becomes increasingly pervasive.  ...  These data flows are then converted into events that are sent (published) to the (pub/sub) broker. Table I summarises the events produced by the adaptor from the underlying data streams.  ... 
doi:10.4108/icst.pervasivehealth2010.8788 dblp:conf/ph/SinghBB10 fatcat:rfl6ythq2zg25nt6z5bxidljaa

Detecting Privacy Violations in Multiple Views Publishing [chapter]

Deming Dou, Stéphane Coulondre
2012 Lecture Notes in Computer Science  
We present a sound data-value-dependent method of detecting privacy violations in the context of multiple views publishing.  ...  Next, we build a benchmark with publicly available data set, Adult Database, at the UC Irvine Machine Learning Repository, and identity data set generated using a coherent database generator called Fake  ...  methods, either over traditional data tables, such as l-diversity [4] , t-closeness [6] , or over data streams, such as SWAF [10] , SKY [5] , CAS-TLE [1] and so on.  ... 
doi:10.1007/978-3-642-32597-7_46 fatcat:rc54ffi4ojbcxhj6skq6rfhap4

A Survey on Privacy Preserving Data Publishing

Gokila S, Venkateswari P
2014 International Journal on Cybernetics & Informatics  
In recent years, exchanging and publishing data has been common for their wealth of opportunities. Security, Privacy and data integrity are considered as challenging problems in data mining.  ...  Data mining is a computational process of analysing and extracting the data from large useful datasets.  ...  Privacy preserving crossed over DATA PUBLISHER DATA RECIPIENT ANONYMIZATION ORIGINAL DATASET RELEASED DATASET various stages in its development.  ... 
doi:10.5121/ijci.2014.3101 fatcat:vswoffoqrrhcfginzeqmg3m7ee

Pervasive Sensing and Monitoring for Situational Awareness [chapter]

Sharad Mehrotra, Nalini Venkatasubramanian, Mark-Oliver Stehr, Carolyn Talcott
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
Such approaches are in contrast to traditional database approach wherein streaming data would be first stored into a database and queried/analyzed later.  ...  Such systems provide on-the-fly techniques to resolving continuous queries and performing analyses on the data streams before (or instead of) storing the streaming data into the database.  ...  It is not allowed to publish this proof online or inprint. This proof copy is the copyright property of the publisher and is confidential until formal publication.  ... 
doi:10.1016/b978-0-12-415815-3.00020-0 fatcat:xg7a6nswn5ebzeejrwmpno4344

Controlling historical information dissemination in publish/subscribe

Jatinder Singh, David M. Eyers, Jean Bacon
2008 Proceedings of the 2008 workshop on Middleware security - MidSec '08  
Publish/subscribe [6] is an asynchronous message delivery paradigm suited to data-driven environments. A principal may be a publisher and/or a subscriber. A publisher  ...  Application environments dealing with sensitive information require mechanisms to define the circumstances for data disclosure.  ...  Our work in securing publish/subscribe systems is in line with this, providing administrative domains (care providers) with fine-grained control over the circumstances in which data is released from their  ... 
doi:10.1145/1463342.1463349 dblp:conf/middleware/SinghEB08a fatcat:ytsvc2d4hzbz5ittnvisr7n5h4

Provenance in Sensornet Republishing [chapter]

Unkyu Park, John Heidemann
2008 Lecture Notes in Computer Science  
We explore the need for data provenance in this system to allow users to understand how processed results are derived and detect and correct anomalies.  ...  Sensornet republishing is the process of transforming on-line sensor data and sharing the filtered, aggregated, or improved data with others.  ...  In addition, over several steps, copying will accumulate many layers of data while linking is fixed in cost.  ... 
doi:10.1007/978-3-540-89965-5_28 fatcat:tobl5vhhhngablmzawtkntr6fi

Privacy-Preserving Technologies [chapter]

Josep Domingo-Ferrer, Alberto Blanco-Justicia
2020 The International Library of Ethics, Law and Technology  
prevention in data mining.  ...  Specifically, it addresses PETs for: (1) identification, authentication and anonymity; (2) private communications; (3) privacy-preserving computations; (4) privacy in databases; and (5) discrimination  ...  The views in this paper are the authors' own and do not necessarily reflect the views of UNESCO or any of the funders.  ... 
doi:10.1007/978-3-030-29053-5_14 fatcat:lbnpp4vk4fe6xi7ftgphaxpnlm

2019 Index IEEE Transactions on Big Data Vol. 5

2020 IEEE Transactions on Big Data  
Jiang, S., +, TBData June 2019 120-133 Image edge detection Ring: Real-Time Emerging Anomaly Monitoring System Over Text Streams.  ...  ., +, TBData June 2019 134-147 Graphical models Ring: Real-Time Emerging Anomaly Monitoring System Over Text Streams.  ... 
doi:10.1109/tbdata.2020.2975953 fatcat:aeai72ddszachltlggv3u5dpru

Higher order mining

John F. Roddick, Myra Spiliopoulou, Daniel Lister, Aaron Ceglar
2008 SIGKDD Explorations  
Second, data in the form of streams are only temporarily available for processing.  ...  If stored at all, stream data are maintained in the form of synopses or derived, abstract representations of the original data.  ...  Cluster trends over a text stream are also addressed by Mei and Zhai [50] . Again, the focus is on detecting topics and studying their evolution.  ... 
doi:10.1145/1412734.1412736 fatcat:yuuur3alcvagnh6zlpaqwdme5q

Credential management in event-driven healthcare systems

Jatinder Sing, David M. Eyers, Jean Bacon
2008 Proceedings of the ACM/IFIP/USENIX international middleware conference companion on Middleware '08 Companion - Companion '08  
We describe the integration of credential management mechanisms with a context-sensitive data control model to provide fine-grained specification of data disclosure policy.  ...  This paper focuses on the management of credentials in event-driven healthcare environments.  ...  This is akin to routine checks by a nurse in a hospital. However, live data streams may be necessary to accurately detect trends.  ... 
doi:10.1145/1462735.1462746 dblp:conf/middleware/SinghEB08 fatcat:eho3avoukjbjzhrikkui4e3s3i

Guest editorial: web of things

Quan Z. Sheng, Xue Li, Anne H.H. Ngu, Yongrui Qin, Dong Xie
2016 Information Systems Frontiers  
Acknowledgments We thank all the authors for considering this special issue as an outlet to publish their research results in the area of WoT.  ...  Finally, we express our gratitude to the Editors-in-Chief, Professor Rao and Professor Ramesh for their kind support, advice, and encouragements throughout the preparation of this special issue.  ...  Data mining challenges may include extraction of temporal characteristics from sensor data streams, event detection from multiple data streams, data stream classification, activity discovery and recognition  ... 
doi:10.1007/s10796-016-9677-3 fatcat:sfxxrleaorhtbmwnvpnxdwacqu

Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis [chapter]

Majed Alshammari, Andrew Simpson
2018 Lecture Notes in Computer Science  
We propose a data-centric approach for identifying and analysing potential privacy risks in a comprehensive manner.  ...  Privacy Impact Assessments (PIAs) play a crucial role in providing privacy protection for data subjects and supporting risk management.  ...  In this paper, we design a new technique, named δ-DOCA, to publish data streams under differential privacy.  ... 
doi:10.1007/978-3-030-00305-0_16 fatcat:zd4hujroqfcy3d7t2b3e5m3peu

Butterfly: Protecting Output Privacy in Stream Mining

Ting Wang, Ling Liu
2008 2008 IEEE 24th International Conference on Data Engineering  
This work studies the problem of protecting output privacy in the context of frequent pattern mining over data streams.  ...  After exposing the privacy breaches existing in current stream mining systems, we propose Butterfly, a light-weighted countermeasure that can effectively eliminate these breaches without explicitly detecting  ...  PROBLEM DEFINITION In this section, we introduce the output privacy issue arising in this context of frequent pattern mining over data streams. A.  ... 
doi:10.1109/icde.2008.4497526 dblp:conf/icde/WangL08 fatcat:flw4m2t2nfgfxlz4jcqublizde

The Indiana Center for Database Systems at Purdue University

Mourad Ouzzani, Sunil Prabhakar, Jeffrey S. Vitter, Xiang Zhang, Walid G. Aref, Elisa Bertino, Ann Christine Catlin, Christopher W. Clifton, Wing-Kai Hon, Ahmed K. Elmagarmid, Arif Ghafoor, Susanne E. Hambrusch
2005 SIGMOD record  
This capability raises several issues like change detection in the streams and the need to cluster streams based on their behavior.  ...  -we define shared summaries over data streams enabling the query engine to avoid looking at the original streams.  ... 
doi:10.1145/1083784.1083795 fatcat:lblzmkuu6vggznk4r44hm5z2oa
« Previous Showing results 1 — 15 out of 8,453 results