A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Releasing Differentially Private Trajectories with Optimized Data Utility
2022
Applied Sciences
The ubiquity of GPS-enabled devices has resulted in an abundance of data about individual trajectories. ...
However, existing works are primarily concerned with maintaining the trajectory data geographic utility and neglect the semantic utility. ...
Acknowledgments: The authors would like to acknowledge the efforts made by the editors and the reviewers, which greatly improved the quality of the paper. ...
doi:10.3390/app12052406
fatcat:afxhckmpfza5dd6ufojzgzizsy
Data tainting and obfuscation: Improving plausibility of incorrect taint
2015
2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)
Code obfuscation is designed to impede the reverse engineering of a binary software. Dynamic data tainting is an analysis technique used to identify dependencies between data in a software. ...
In this paper, we present a code transformation technique meant to prevent the identification of useless results: a few lines of code are inserted in the obfuscated software, so that the results obtained ...
They should be placed closely before points where the taint is spread from a single data to multiple data. ...
doi:10.1109/scam.2015.7335407
dblp:conf/scam/BlazyRS15
fatcat:mfmft4d3dvhllg373umkgkbdke
Malware detection with quantitative data flow graphs
2014
Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14
We base our data flow analysis on the incremental construction of aggregated quantitative data flow graphs. ...
We demonstrate the feasibility of our approach through a prototypical instantiation and implementation for the Windows operating system. ...
Second, approaches of the cited kind are typically sensitive to advanced behavioral obfuscation techniques like reordering system calls, randomly inserting bogus calls, or substituting calls with semantically ...
doi:10.1145/2590296.2590319
dblp:conf/ccs/WuchnerOP14
fatcat:eidm6uponbe3fd73zut54zgrz4
Context-driven Granular Disclosure Control for Internet of Things Applications
2017
IEEE Transactions on Big Data
One such technique is called data obfuscation in which data is deliberately modified to blur the sensitive information, while preserving the data utility. ...
The current obfuscation techniques, however, focus on the privacy of published datasets shared with untrusted parties. ...
At the time of data dissemination, the obfuscator masks the sensitive data based on contextual information. ...
doi:10.1109/tbdata.2017.2737463
fatcat:jmfrdvwkybf4ndfipc3j7cjoqy
Obfuscating the Topical Intention in Enterprise Text Search
2012
2012 IEEE 28th International Conference on Data Engineering
The text search queries in an enterprise can reveal the users' topic of interest, and in turn confidential staff or business information. ...
To safeguard the enterprise from consequences arising from a disclosure of the query traces, it is desirable to obfuscate the true user intention from the search engine, without requiring it to be re-engineered ...
ACKNOWLEDGEMENT We thank the reviewers for their constructive feedback. HweeHwa Pang is supported by Research Grant 10-C220-SMU-003 from the Singapore Management University. ...
doi:10.1109/icde.2012.43
dblp:conf/icde/PangXS12
fatcat:mhi3sbjssbcfhf7lwicw35lq74
Hypermedia data modeling, coding, and semiotics
1997
Proceedings of the IEEE
While the hypertext data model enables this goal, that is not true for the data models of other media forms. ...
This paper initially presents an overview of the hypertext data model, contrasting it with existing multimedia data and coding models. ...
ACKNOWLEDGMENT The author wishes to express his gratitude to Dr. A. Qureshi for his considerable assistance in the preparation of this manuscript, to A. Wardhani and K. ...
doi:10.1109/5.611118
fatcat:vj6eklsxknacxmwj5k2qvddagu
Data Handling in Industry 4.0: Interoperability Based on Distributed Ledger Technology
2020
Sensors
To develop the interoperability principle, a specific proposal to provide a (public and encrypted) data management solution to ensure information transparency is presented, which enables semantic data ...
Taking into account data interconnection and information transparency, it is necessary to enhance the existing frameworks. ...
This is the case where sensitive information needs to be shared among only a limited number of stakeholders. ...
doi:10.3390/s20113046
pmid:32471234
pmcid:PMC7308854
fatcat:ysb65haenjeq5o3yzgqgdplhwe
Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions
[chapter]
2015
Data-Centric Systems and Applications
Unfortunately, the downside of such convenience is an increased exposure of possibly sensitive information and new risks of privacy vulnerabilities. ...
In this chapter, we survey the main issues related to privacy in emerging pervasive scenarios and discuss some approaches towards their solution. ...
Ministry of Research within PRIN project "GenData 2020" (2010RT-FWBH). ...
doi:10.1007/978-3-319-20062-0_3
fatcat:j2qxhi4nnndntjrrpa3wqi2ws4
Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research
2010
IEEE Security and Privacy
Anonymized data may not immediately expose PII, but any time a piece of de-identified data has been linked to first order identifying information, other anonymous aspects of the obfuscated data are easier ...
Prominent privacy-sensitive techniques include: A. Deleting/filtering sensitive data. B. Deleting/filtering part(s) of the sensitive data. C. ...
doi:10.1109/msp.2010.57
fatcat:fb6saht4rvdjtjvjsdkab4knvq
Information Security in Big Data: Privacy and Data Mining
2014
IEEE Access
The growing popularity and development of data mining technologies bring serious threat to the security of individual's sensitive information. ...
The basic idea of PPDM is to modify the data in such a way so as to perform data mining algorithms effectively without compromising the security of sensitive information contained in the data. ...
[44] group nodes in the underlying map to create obfuscation areas around sensitive locations. The sensitive nodes on the map are pre-specified by the data owner. ...
doi:10.1109/access.2014.2362522
fatcat:oxnmv2kjy5bllhotbkqvxd5rfu
Manipulating semantic values in kernel data structures: Attack assessments and implications
2013
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
However, the space and severity of Semantic Value Manipulation (SVM) attacks have not received sufficient understanding. ...
Our experimental results show that the space of SVM attacks is vast for both OSes. ...
Any opinion, findings, conclusions, or recommendations are those of the authors and not necessarily of the funding agencies. ...
doi:10.1109/dsn.2013.6575344
dblp:conf/dsn/PrakashVYL13
fatcat:jivirx6phveqdanowp7oerf3ze
A Study on Privacy Preserving Methodologies in Big Data
2016
Indian Journal of Science and Technology
Objectives: Massive collection of individuals' information in big data has its own confidentiality threats which results in leakage of sensitive data. ...
the advantage of the stakeholders and big data analytics is substantiated. ...
Big data can deliver analytics that can obtain value from the vast information, evading restrictions of organized data stores and recognizing correspondences. ...
doi:10.17485/ijst/2016/v9is1/104234
fatcat:o3irtlp4hrcxbnuhufjczebw7q
Style Pooling: Automatic Text Style Obfuscation for Improved Classification Fairness
[article]
2021
arXiv
pre-print
seen in training, and (2) a maximal notion that seeks to obfuscate by adding stylistic features of all sensitive attributes to text, in effect, computing a union of styles. ...
Our framework operationalizes the notion of obfuscated style in a flexible way that enables two distinct notions of obfuscated style: (1) a minimal notion that effectively intersects the various styles ...
Acknowledgments The authors would like to thank the anonymous reviewers and meta-reviewers for their helpful feedback. We also thank Junxian He for insightful discussions. ...
arXiv:2109.04624v1
fatcat:s2hjjsu4k5c37clhytgaif4vcu
Protecting Anonymity in Data-Driven Biomedical Science
[chapter]
2014
Lecture Notes in Computer Science
One solution for this problem lies in the protection of sensitive information in medical data sets by applying appropriate anonymization. ...
For results derived using empirical methods, the underlying data set should be made available, at least during the review process for the reviewers, to ensure the quality of the research done and to prevent ...
Acknowledgments The research was funded by COMET K1 and grant 840824 (KIRAS) by the FFG -Austrian Research Promotion Agency. ...
doi:10.1007/978-3-662-43968-5_17
fatcat:4q3yymgvqvfwpbt5w2sjq3ymnq
Using Semantically Annotated Models for Supporting Business Process Benchmarking
[chapter]
2011
Lecture Notes in Business Information Processing
language, conduct semantic analyses for the purpose of performance measurement, and obfuscate the information contained in the models for ensuring confidentiality. ...
We show how semantic annotations can support the preparation of process benchmarking data by adding machine-processable semantic information to existing process models without modifying the original modeling ...
Furthermore, the annotations create the basis for an obfuscation mechanism that deals with sensitive information and acts as an additional incentive to share the data. ...
doi:10.1007/978-3-642-24511-4_3
fatcat:efeq3iskwjhevamgzonce6yo3u
« Previous
Showing results 1 — 15 out of 1,930 results