KPDR : An Effective Method of Privacy Protection
نویسندگان
چکیده
منابع مشابه
An Integrated Framework for Database Privacy Protection
One of the central objectives of studying database privacy protection is to protect sensitive information held in a database from being inferred by a generic database user. In this paper, we present a framework to assist in the formal analysis of the database inference problem. The framework is based on an association network which is composed of a similarity measure and a Bayesian network model.
متن کامل580 Protection of Privacy
Balyard had stopped off at the local personnel office for the name of a representative American in the neighborhood. The personnel machines had considered the problem and ejected the card of E. R. B. Hagstrohm, who was statistically average in every respect save for the number of his initials: his age (36), his height (5'7"), his weight (148 lbs.), his years of marriage (11), his I.Q. (83), the...
متن کاملDesign and fabrication of an effective micromixer through passive method
Micromixer is a significant component of microfluidics particularly in lab-on-chip applications so that there has been a growing need for design and fabrication of micromixers with a shorter length and higher efficiency. Despite most of the passive micromixers that suffer from long mixing path and complicated geometry to increase the efficiency, our novel design suggests a highly efficient micr...
متن کاملAlgorithm-irrelevant Privacy Protection Method Based on Randomization
Privacy preserving classification mining is one of the fast-growing subareas of data mining. The algorithm-related methods of privacy-preserving are designed for particular classification algorithm and couldn’t be used in other classification algorithms. To solve this problem, it proposes a new algorithm-irrelevant privacy protection method based on randomization. This method generates and open...
متن کاملTrust Based Privacy Protection Method in Pervasive Computing
In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complexity
سال: 2021
ISSN: 1099-0526,1076-2787
DOI: 10.1155/2021/6674639