A Survey on Centralised and Distributed Approaches for Subtree Anonymization
نویسندگان
چکیده
منابع مشابه
On Distributed k-Anonymization
When a database owner needs to disclose her data, she can k-anonymize her data to protect the involved individuals’ privacy. However, if the data is distributed between two owners, then it is an open question whether the two owners can jointly k-anonymize the union of their data, such that the information suppressed in one owner’s data is not revealed to the other owner. In this paper, we study...
متن کاملA Combining centralised and distributed testing
Many systems interact with their environment at distributed interfaces (ports) and sometimes it is not possible to place synchronised local testers at the ports of the system under test (SUT). There are then two main approaches to testing: having independent local testers or a single centralised tester that interacts asynchronously with the SUT. The power of using independent testers has been c...
متن کاملA Survey on Data Anonymization Techniques for Large Data Sets
Data anonymization is used to remove user specific information from published data sets. Different kinds of anonymization techniques are used to eliminate various types of attacks. Anonymization process modifies the data into human unidentifiable form and it is most efficient than any other privacy preserving techniques like encryption etc. Encryption is costly when compared to anonymization as...
متن کاملA Survey on Buckling and Vibrations of a Viscoelastic Beam under Distributed Lateral and Axial Loads
In this paper, based on Kelvin and Linear Standard Solid models, dynamic response and the buckling load of a viscoelastic beam under lateral and axial loads have been determined. The governing equations have been extracted using Euler and Timoshenko theories and their analytical solutions have been obtained by using the eigenfunctions expansion method. Buckling load have been calculated by us...
متن کاملA Survey of Distributed Intrusion Detection Approaches
Distributed intrustion detection systems detect attacks on computer systems by analyzing data aggregated from distributed sources. The distributed nature of the data sources allows patterns in the data to be seen that might not be detectable if each of the sources were examined individually. This paper describes the various approaches that have been developed to share and analyze data in such s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2016
ISSN: 1877-0509
DOI: 10.1016/j.procs.2016.05.268