A Survey on Centralised and Distributed Approaches for Subtree Anonymization

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Distributed k-Anonymization

When a database owner needs to disclose her data, she can k-anonymize her data to protect the involved individuals’ privacy. However, if the data is distributed between two owners, then it is an open question whether the two owners can jointly k-anonymize the union of their data, such that the information suppressed in one owner’s data is not revealed to the other owner. In this paper, we study...

متن کامل

A Combining centralised and distributed testing

Many systems interact with their environment at distributed interfaces (ports) and sometimes it is not possible to place synchronised local testers at the ports of the system under test (SUT). There are then two main approaches to testing: having independent local testers or a single centralised tester that interacts asynchronously with the SUT. The power of using independent testers has been c...

متن کامل

A Survey on Data Anonymization Techniques for Large Data Sets

Data anonymization is used to remove user specific information from published data sets. Different kinds of anonymization techniques are used to eliminate various types of attacks. Anonymization process modifies the data into human unidentifiable form and it is most efficient than any other privacy preserving techniques like encryption etc. Encryption is costly when compared to anonymization as...

متن کامل

A Survey on Buckling and Vibrations of a Viscoelastic Beam under Distributed Lateral and Axial Loads

In this paper, based on Kelvin and Linear Standard Solid models, dynamic response and the buckling load of a viscoelastic beam under  lateral and axial loads have been determined. The governing equations have been extracted using Euler  and Timoshenko theories and their analytical solutions have been obtained by using the eigenfunctions expansion method. Buckling load have been calculated by us...

متن کامل

A Survey of Distributed Intrusion Detection Approaches

Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggregated from distributed sources. The distributed nature of the data sources allows patterns in the data to be seen that might not be detectable if each of the sources were examined individually. This paper describes the various approaches that have been developed to share and analyze data in such s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2016

ISSN: 1877-0509

DOI: 10.1016/j.procs.2016.05.268