Filters








1,930 Hits in 5.7 sec

Releasing Differentially Private Trajectories with Optimized Data Utility

Bing Li, Hong Zhu, Meiyi Xie
2022 Applied Sciences  
The ubiquity of GPS-enabled devices has resulted in an abundance of data about individual trajectories.  ...  However, existing works are primarily concerned with maintaining the trajectory data geographic utility and neglect the semantic utility.  ...  Acknowledgments: The authors would like to acknowledge the efforts made by the editors and the reviewers, which greatly improved the quality of the paper.  ... 
doi:10.3390/app12052406 fatcat:afxhckmpfza5dd6ufojzgzizsy

Data tainting and obfuscation: Improving plausibility of incorrect taint

Sandrine Blazy, Stephanie Riaud, Thomas Sirvent
2015 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)  
Code obfuscation is designed to impede the reverse engineering of a binary software. Dynamic data tainting is an analysis technique used to identify dependencies between data in a software.  ...  In this paper, we present a code transformation technique meant to prevent the identification of useless results: a few lines of code are inserted in the obfuscated software, so that the results obtained  ...  They should be placed closely before points where the taint is spread from a single data to multiple data.  ... 
doi:10.1109/scam.2015.7335407 dblp:conf/scam/BlazyRS15 fatcat:mfmft4d3dvhllg373umkgkbdke

Malware detection with quantitative data flow graphs

Tobias Wüchner, Martín Ochoa, Alexander Pretschner
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
We base our data flow analysis on the incremental construction of aggregated quantitative data flow graphs.  ...  We demonstrate the feasibility of our approach through a prototypical instantiation and implementation for the Windows operating system.  ...  Second, approaches of the cited kind are typically sensitive to advanced behavioral obfuscation techniques like reordering system calls, randomly inserting bogus calls, or substituting calls with semantically  ... 
doi:10.1145/2590296.2590319 dblp:conf/ccs/WuchnerOP14 fatcat:eidm6uponbe3fd73zut54zgrz4

Context-driven Granular Disclosure Control for Internet of Things Applications

Arezou Soltani Panah, Ali Yavari, Ron van Schyndel, Dimitrios Georgakopoulos, Xun Yi
2017 IEEE Transactions on Big Data  
One such technique is called data obfuscation in which data is deliberately modified to blur the sensitive information, while preserving the data utility.  ...  The current obfuscation techniques, however, focus on the privacy of published datasets shared with untrusted parties.  ...  At the time of data dissemination, the obfuscator masks the sensitive data based on contextual information.  ... 
doi:10.1109/tbdata.2017.2737463 fatcat:jmfrdvwkybf4ndfipc3j7cjoqy

Obfuscating the Topical Intention in Enterprise Text Search

Hwee Hwa Pang, Xiaokui Xiao, Jialie Shen
2012 2012 IEEE 28th International Conference on Data Engineering  
The text search queries in an enterprise can reveal the users' topic of interest, and in turn confidential staff or business information.  ...  To safeguard the enterprise from consequences arising from a disclosure of the query traces, it is desirable to obfuscate the true user intention from the search engine, without requiring it to be re-engineered  ...  ACKNOWLEDGEMENT We thank the reviewers for their constructive feedback. HweeHwa Pang is supported by Research Grant 10-C220-SMU-003 from the Singapore Management University.  ... 
doi:10.1109/icde.2012.43 dblp:conf/icde/PangXS12 fatcat:mhi3sbjssbcfhf7lwicw35lq74

Hypermedia data modeling, coding, and semiotics

R. Gonzalez
1997 Proceedings of the IEEE  
While the hypertext data model enables this goal, that is not true for the data models of other media forms.  ...  This paper initially presents an overview of the hypertext data model, contrasting it with existing multimedia data and coding models.  ...  ACKNOWLEDGMENT The author wishes to express his gratitude to Dr. A. Qureshi for his considerable assistance in the preparation of this manuscript, to A. Wardhani and K.  ... 
doi:10.1109/5.611118 fatcat:vj6eklsxknacxmwj5k2qvddagu

Data Handling in Industry 4.0: Interoperability Based on Distributed Ledger Technology

Shengjing Sun, Xiaochen Zheng, Javier Villalba-Díez, Joaquín Ordieres-Meré
2020 Sensors  
To develop the interoperability principle, a specific proposal to provide a (public and encrypted) data management solution to ensure information transparency is presented, which enables semantic data  ...  Taking into account data interconnection and information transparency, it is necessary to enhance the existing frameworks.  ...  This is the case where sensitive information needs to be shared among only a limited number of stakeholders.  ... 
doi:10.3390/s20113046 pmid:32471234 pmcid:PMC7308854 fatcat:ysb65haenjeq5o3yzgqgdplhwe

Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions [chapter]

Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati
2015 Data-Centric Systems and Applications  
Unfortunately, the downside of such convenience is an increased exposure of possibly sensitive information and new risks of privacy vulnerabilities.  ...  In this chapter, we survey the main issues related to privacy in emerging pervasive scenarios and discuss some approaches towards their solution.  ...  Ministry of Research within PRIN project "GenData 2020" (2010RT-FWBH).  ... 
doi:10.1007/978-3-319-20062-0_3 fatcat:j2qxhi4nnndntjrrpa3wqi2ws4

Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research

Erin E Kenneally, Kimberly Claffy
2010 IEEE Security and Privacy  
Anonymized data may not immediately expose PII, but any time a piece of de-identified data has been linked to first order identifying information, other anonymous aspects of the obfuscated data are easier  ...  Prominent privacy-sensitive techniques include: A. Deleting/filtering sensitive data. B. Deleting/filtering part(s) of the sensitive data. C.  ... 
doi:10.1109/msp.2010.57 fatcat:fb6saht4rvdjtjvjsdkab4knvq

Information Security in Big Data: Privacy and Data Mining

Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, Yong Ren
2014 IEEE Access  
The growing popularity and development of data mining technologies bring serious threat to the security of individual's sensitive information.  ...  The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data.  ...  [44] group nodes in the underlying map to create obfuscation areas around sensitive locations. The sensitive nodes on the map are pre-specified by the data owner.  ... 
doi:10.1109/access.2014.2362522 fatcat:oxnmv2kjy5bllhotbkqvxd5rfu

Manipulating semantic values in kernel data structures: Attack assessments and implications

Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin
2013 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
However, the space and severity of Semantic Value Manipulation (SVM) attacks have not received sufficient understanding.  ...  Our experimental results show that the space of SVM attacks is vast for both OSes.  ...  Any opinion, findings, conclusions, or recommendations are those of the authors and not necessarily of the funding agencies.  ... 
doi:10.1109/dsn.2013.6575344 dblp:conf/dsn/PrakashVYL13 fatcat:jivirx6phveqdanowp7oerf3ze

A Study on Privacy Preserving Methodologies in Big Data

J. Vinothkumar, V. Santhi
2016 Indian Journal of Science and Technology  
Objectives: Massive collection of individuals' information in big data has its own confidentiality threats which results in leakage of sensitive data.  ...  the advantage of the stakeholders and big data analytics is substantiated.  ...  Big data can deliver analytics that can obtain value from the vast information, evading restrictions of organized data stores and recognizing correspondences.  ... 
doi:10.17485/ijst/2016/v9is1/104234 fatcat:o3irtlp4hrcxbnuhufjczebw7q

Style Pooling: Automatic Text Style Obfuscation for Improved Classification Fairness [article]

Fatemehsadat Mireshghallah, Taylor Berg-Kirkpatrick
2021 arXiv   pre-print
seen in training, and (2) a maximal notion that seeks to obfuscate by adding stylistic features of all sensitive attributes to text, in effect, computing a union of styles.  ...  Our framework operationalizes the notion of obfuscated style in a flexible way that enables two distinct notions of obfuscated style: (1) a minimal notion that effectively intersects the various styles  ...  Acknowledgments The authors would like to thank the anonymous reviewers and meta-reviewers for their helpful feedback. We also thank Junxian He for insightful discussions.  ... 
arXiv:2109.04624v1 fatcat:s2hjjsu4k5c37clhytgaif4vcu

Protecting Anonymity in Data-Driven Biomedical Science [chapter]

Peter Kieseberg, Heidelinde Hobel, Sebastian Schrittwieser, Edgar Weippl, Andreas Holzinger
2014 Lecture Notes in Computer Science  
One solution for this problem lies in the protection of sensitive information in medical data sets by applying appropriate anonymization.  ...  For results derived using empirical methods, the underlying data set should be made available, at least during the review process for the reviewers, to ensure the quality of the research done and to prevent  ...  Acknowledgments The research was funded by COMET K1 and grant 840824 (KIRAS) by the FFG -Austrian Research Promotion Agency.  ... 
doi:10.1007/978-3-662-43968-5_17 fatcat:4q3yymgvqvfwpbt5w2sjq3ymnq

Using Semantically Annotated Models for Supporting Business Process Benchmarking [chapter]

Hans-Georg Fill
2011 Lecture Notes in Business Information Processing  
language, conduct semantic analyses for the purpose of performance measurement, and obfuscate the information contained in the models for ensuring confidentiality.  ...  We show how semantic annotations can support the preparation of process benchmarking data by adding machine-processable semantic information to existing process models without modifying the original modeling  ...  Furthermore, the annotations create the basis for an obfuscation mechanism that deals with sensitive information and acts as an additional incentive to share the data.  ... 
doi:10.1007/978-3-642-24511-4_3 fatcat:efeq3iskwjhevamgzonce6yo3u
« Previous Showing results 1 — 15 out of 1,930 results