A new approach to interdomain routing based on secure multi-party computation
Interdomain routing involves coordination among mutually distrustful parties, leading to the
requirements that BGP provide policy autonomy, flexibility, and privacy. BGP provides these …
requirements that BGP provide policy autonomy, flexibility, and privacy. BGP provides these …
AnonymousCloud: A data ownership privacy provider framework in cloud computing
SM Khan, KW Hamlen - … on Trust, Security and Privacy in …, 2012 - ieeexplore.ieee.org
A means of reliably concealing ownership of cloud data without impeding computation over
the data is presented and evaluated. This facilitates information privacy enforcement in …
the data is presented and evaluated. This facilitates information privacy enforcement in …
Frequent grams based embedding for privacy preserving record linkage
In this paper, we study the problem of privacy preserving record linkage which aims to
perform record linkage without revealing anything about the non-linked records. We propose …
perform record linkage without revealing anything about the non-linked records. We propose …
Information fusion in data privacy: A survey
G Navarro-Arribas, V Torra - Information Fusion, 2012 - Elsevier
In this paper, we review the role of information fusion in data privacy. To that end, we
introduce data privacy, and describe how information and data fusion are used in some …
introduce data privacy, and describe how information and data fusion are used in some …
An efficient approach for privacy preserving distributed k-means clustering based on shamir's secret sharing scheme
Privacy preserving data mining has gained considerable attention because of the increased
concerns to ensure privacy of sensitive information. Amongst the two basic approaches for …
concerns to ensure privacy of sensitive information. Amongst the two basic approaches for …
Privacy-preserving SOM-based recommendations on horizontally distributed data
To produce predictions with decent accuracy, collaborative filtering algorithms need
sufficient data. Due to the nature of online shopping and increasing amount of online …
sufficient data. Due to the nature of online shopping and increasing amount of online …
Achieving both valid and secure logistic regression analysis on aggregated data from different private sources
Y Nardi, SE Fienberg, RJ Hall - … of Privacy and …, 2012 - journalprivacyconfidentiality.org
Preserving the privacy of individual databases when carrying out statistical calculations has
a relatively long history in statistics and had been the focus of much recent attention in …
a relatively long history in statistics and had been the focus of much recent attention in …
[HTML][HTML] A protocol for the secure linking of registries for HPV surveillance
Introduction In order to monitor the effectiveness of HPV vaccination in Canada the linkage
of multiple data registries may be required. These registries may not always be managed by …
of multiple data registries may be required. These registries may not always be managed by …
[PDF][PDF] An iterative two-party protocol for scalable privacy-preserving record linkage
D Vatsalan, P Christen - … of the Tenth …, 2012 - crpit.scem.westernsydney.edu.au
Record linkage is the process of identifying which records in different databases refer to the
same realworld entities. When personal details of individuals, such as names and …
same realworld entities. When personal details of individuals, such as names and …
Knowledge-oriented secure multiparty computation
Protocols for secure multiparty computation (SMC) allow a set of mutually distrusting parties
to compute a function f of their private inputs while revealing nothing about their inputs …
to compute a function f of their private inputs while revealing nothing about their inputs …