A new approach to interdomain routing based on secure multi-party computation

D Gupta, A Segal, A Panda, G Segev… - Proceedings of the 11th …, 2012 - dl.acm.org
Interdomain routing involves coordination among mutually distrustful parties, leading to the
requirements that BGP provide policy autonomy, flexibility, and privacy. BGP provides these …

AnonymousCloud: A data ownership privacy provider framework in cloud computing

SM Khan, KW Hamlen - … on Trust, Security and Privacy in …, 2012 - ieeexplore.ieee.org
A means of reliably concealing ownership of cloud data without impeding computation over
the data is presented and evaluated. This facilitates information privacy enforcement in …

Frequent grams based embedding for privacy preserving record linkage

L Bonomi, L Xiong, R Chen, BCM Fung - Proceedings of the 21st ACM …, 2012 - dl.acm.org
In this paper, we study the problem of privacy preserving record linkage which aims to
perform record linkage without revealing anything about the non-linked records. We propose …

Information fusion in data privacy: A survey

G Navarro-Arribas, V Torra - Information Fusion, 2012 - Elsevier
In this paper, we review the role of information fusion in data privacy. To that end, we
introduce data privacy, and describe how information and data fusion are used in some …

An efficient approach for privacy preserving distributed k-means clustering based on shamir's secret sharing scheme

S Patel, S Garasia, D Jinwala - Trust Management VI: 6th IFIP WG 11.11 …, 2012 - Springer
Privacy preserving data mining has gained considerable attention because of the increased
concerns to ensure privacy of sensitive information. Amongst the two basic approaches for …

Privacy-preserving SOM-based recommendations on horizontally distributed data

C Kaleli, H Polat - Knowledge-Based Systems, 2012 - Elsevier
To produce predictions with decent accuracy, collaborative filtering algorithms need
sufficient data. Due to the nature of online shopping and increasing amount of online …

Achieving both valid and secure logistic regression analysis on aggregated data from different private sources

Y Nardi, SE Fienberg, RJ Hall - … of Privacy and …, 2012 - journalprivacyconfidentiality.org
Preserving the privacy of individual databases when carrying out statistical calculations has
a relatively long history in statistics and had been the focus of much recent attention in …

[HTML][HTML] A protocol for the secure linking of registries for HPV surveillance

K El Emam, S Samet, J Hu, L Peyton, C Earle… - PLoS …, 2012 - journals.plos.org
Introduction In order to monitor the effectiveness of HPV vaccination in Canada the linkage
of multiple data registries may be required. These registries may not always be managed by …

[PDF][PDF] An iterative two-party protocol for scalable privacy-preserving record linkage

D Vatsalan, P Christen - … of the Tenth …, 2012 - crpit.scem.westernsydney.edu.au
Record linkage is the process of identifying which records in different databases refer to the
same realworld entities. When personal details of individuals, such as names and …

Knowledge-oriented secure multiparty computation

P Mardziel, M Hicks, J Katz, M Srivatsa - Proceedings of the 7th …, 2012 - dl.acm.org
Protocols for secure multiparty computation (SMC) allow a set of mutually distrusting parties
to compute a function f of their private inputs while revealing nothing about their inputs …