Filters








7 Hits in 2.1 sec

SC2D

Jeffrey C. Mogul, Martin Arlitt
2006 Proceedings of the 2006 SIGCOMM workshop on Mining network data - MineNet '06  
However, trace anonymization can have both technical and non-technical drawbacks. We propose an alternative to trace-to-trace transformation that operates at a different level of abstraction.  ...  The traditional resolution of this dilemma uses trace anonymization to remove secret information from traces, theoretically leaving enough information for research purposes while protecting privacy and  ...  OUR PROPOSED ALTERNATIVE In the traditional trace anonymization model, we start by getting the data-owning organization, such as an ISP or corporation, to collect a raw trace at the appropriate point.  ... 
doi:10.1145/1162678.1162686 dblp:conf/minenet/MogulA06 fatcat:4v7wbyh6y5gj3a7qfrw3epzjba

Segregation in a Mycorrhizal Fungus Alters Rice Growth and Symbiosis-Specific Gene Transcription

Caroline Angelard, Alexandre Colard, Hélène Niculita-Hirzel, Daniel Croll, Ian R. Sanders
2010 Current Biology  
This process also resulted in an alteration of symbiosis-specific gene transcription in rice.  ...  First, by random distribution of nuclei at spore formation, new offspring of an AMF could receive different complements of nucleotypes compared to the parent or siblings-we consider this as segregation  ...  Bonvin for assistance with DNA extraction and molecular analyses, and three anonymous reviewers for helpful comments.  ... 
doi:10.1016/j.cub.2010.05.031 pmid:20541408 fatcat:cjdi5c335rdmxmofkkxse5sn3u

Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research

Erin E Kenneally, Kimberly Claffy
2010 IEEE Security and Privacy  
X Mediate (SC2D) X Age Data X X X X X Limit Quantity X X X X X Layer Anonymization X X X X the weakness of a one-dimensional technical approach.  ...  Re-identification /De-anonymizing misuse risk. Re-identification/de-anonymization, involves reversing data anonymization or masks to link an obfuscated identifier with its associated person.  ... 
doi:10.1109/msp.2010.57 fatcat:fb6saht4rvdjtjvjsdkab4knvq

Differentially-private network trace analysis

Frank McSherry, Ratul Mahajan
2010 Computer communication review  
We are able to express all of our target analyses, though for some of them an approximate expression is required to keep the error-level low.  ...  We consider the potential for network trace analysis while providing the guarantees of "differential privacy."  ...  Acknowledgments We are grateful to Saikat Guha, Suman Nath, Alec Wolman, the anonymous reviewers and our shepherd, Walter Willinger, for feedback on this paper.  ... 
doi:10.1145/1851275.1851199 fatcat:udvcc2kvizbc3eymlkbnnjpczy

Differentially-private network trace analysis

Frank McSherry, Ratul Mahajan
2010 Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM - SIGCOMM '10  
We are able to express all of our target analyses, though for some of them an approximate expression is required to keep the error-level low.  ...  We consider the potential for network trace analysis while providing the guarantees of "differential privacy."  ...  Acknowledgments We are grateful to Saikat Guha, Suman Nath, Alec Wolman, the anonymous reviewers and our shepherd, Walter Willinger, for feedback on this paper.  ... 
doi:10.1145/1851182.1851199 dblp:conf/sigcomm/McSherryM10 fatcat:4ggh5odke5hpjlstbyoroyc4ki

Shanon

Mislav Culig
2021 unpublished
the data that needs to be anonymized.  ...  To minimize the chance of exposing vulnerabilities and sensitive or private information, packet traces need to be anonymized before sharing, meaning as much sensitive data as possible needs to be removed  ...  Extended scope Alternatives to packet traces have been proposed.  ... 
doi:10.25365/thesis.65779 fatcat:yvhg5fetcfac3pojpio7cwrkmq

A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization

Yingbo Song
2017
This thesis proposes a new behavior-based approach towards network trace source-anonymization, motivated by the concept of anonymity-by-crowds, and conditioned on the statistical similarity in host behavior  ...  Optimal segmentation of the population into anonymized groups is approximated with a graph-partitioning problem where maximization of this anonymity metric is an intrinsic property of the solution.  ...  packet trace anonymization.  ... 
doi:10.7916/d8280fq6 fatcat:carg7fc7izekdkjwbcdlspi7ui