enter search term and/or author name
Anonymization-based attacks in privacy-preserving data publishing
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei
Article No.: 8
Data publishing generates much concern over the protection of individual privacy. Recent studies consider cases where the adversary may possess different kinds of knowledge about the data. In this article, we show that knowledge of the mechanism...
A framework for efficient data anonymization under privacy and accuracy constraints
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, Nikos Mamoulis
Article No.: 9
Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy-preserving paradigms of k-anonymity and l-diversity. k-anonymity protects against the identification...
Efficient reasoning about a robust XML key fragment
Sven Hartmann, Sebastian Link
Article No.: 10
We review key constraints in the context of XML as introduced by Buneman et al. We demonstrate that:
(1) one of the proposed inference rules is not sound in general, and
(2) the inference rules are incomplete for XML key implication,...
Snapshot isolation and integrity constraints in replicated databases
Yi Lin, Bettina Kemme, Ricardo Jiménez-Peris, Marta Patiño-Martínez, José Enrique Armendáriz-Iñigo
Article No.: 11
Database replication is widely used for fault tolerance and performance. However, it requires replica control to keep data copies consistent despite updates. The traditional correctness criterion for the concurrent execution of transactions in a...
Online databases respond to a user query with result records encoded in HTML files. Data extraction, which is important for many applications, extracts the records from the HTML files automatically. We present a novel data extraction method, ODE...