KPDR : An Effective Method of Privacy Protection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Integrated Framework for Database Privacy Protection

One of the central objectives of studying database privacy protection is to protect sensitive information held in a database from being inferred by a generic database user. In this paper, we present a framework to assist in the formal analysis of the database inference problem. The framework is based on an association network which is composed of a similarity measure and a Bayesian network model.

متن کامل

580 Protection of Privacy

Balyard had stopped off at the local personnel office for the name of a representative American in the neighborhood. The personnel machines had considered the problem and ejected the card of E. R. B. Hagstrohm, who was statistically average in every respect save for the number of his initials: his age (36), his height (5'7"), his weight (148 lbs.), his years of marriage (11), his I.Q. (83), the...

متن کامل

Design and fabrication of an effective micromixer through passive method

Micromixer is a significant component of microfluidics particularly in lab-on-chip applications so that there has been a growing need for design and fabrication of micromixers with a shorter length and higher efficiency. Despite most of the passive micromixers that suffer from long mixing path and complicated geometry to increase the efficiency, our novel design suggests a highly efficient micr...

متن کامل

Algorithm-irrelevant Privacy Protection Method Based on Randomization

Privacy preserving classification mining is one of the fast-growing subareas of data mining. The algorithm-related methods of privacy-preserving are designed for particular classification algorithm and couldn’t be used in other classification algorithms. To solve this problem, it proposes a new algorithm-irrelevant privacy protection method based on randomization. This method generates and open...

متن کامل

Trust Based Privacy Protection Method in Pervasive Computing

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Complexity

سال: 2021

ISSN: 1099-0526,1076-2787

DOI: 10.1155/2021/6674639