By Md. Sadim Mahmud, Sylvia L. Osborn (auth.), Willem Jonker, Milan Petković (eds.)

ISBN-10: 3642328725

ISBN-13: 9783642328725

ISBN-10: 3642328733

ISBN-13: 9783642328732

This booklet constitutes the refereed court cases of the ninth VLDB Workshop on safe facts administration held in Istanbul, Turkey, in August 27, 2012.
The 12 revised complete papers provided have been conscientiously reviewed and chosen from 22 submissions. The papers are geared up in topical sections on privateness safety, entry regulate, safe garage at the cloud, and belief at the Web.

Show description

Read Online or Download Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings PDF

Best nonfiction_7 books

Download e-book for kindle: Nonlinear Crack Models for Nonmetallic Materials by Alberto Carpinteri (auth.), Alberto Carpinteri (eds.)

During this quantity a survey of the main correct nonlinear crack versions is equipped, with the aim of examining the nonlinear mechanical results taking place on the tip of macrocracks in quasi-brittle fabrics - similar to concrete, rocks, ceramics, polymers, high-strength metal alloys - and in brittle-matrix fibre-reinforced composites.

Extra info for Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings

Example text

What happens if Eve has a set of records R? There is no simple answer in this case, but we take a “conservative” approach and define leakage as the worst leakage that may occur when Eve looks at any one of her R records. That is, L0 (R, e) = maxr∈R L(r, e). Note that we are overloading the symbol L: if the first parameter is a set, it refers to set leakage; if the first parameter is a single record, then it is record leakage. We use the “0” superscript to distinguish this basic set leakage from leakage after the adversary analyzes and possibly combines records (next subsection).

6]. The F measure was introduced by van Rijsbergen [16]. Information leakage adopts these measures in a privacy setting. In addition, our measure reflects the adversary confidence and data analysis. Compared to probabilistic information retrieval [10] where documents are probabilistically ranked, our work probabilistically computes the information leakage itself using possible worlds semantics. 8 Conclusion We have proposed a framework using information leakage as a measure for data privacy. , buying a product from a vendor online).

Adversary Confidence As mentioned earlier, the confidence that adversary Eve has on her data plays a role in computing leakage. For example, Eve may have gotten some information of r from an unreliable website. Or Eve may have heard rumors of the subject indirectly from someone else. If Eve is not so confident about r, then even if r has a high accuracy against e, the information leakage should be less than when Eve is more confident. E. Whang and H. Garcia-Molina not accurate, then the information leakage should be considered less than when Eve is not so confident about the inaccurate information.

Download PDF sample

Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings by Md. Sadim Mahmud, Sylvia L. Osborn (auth.), Willem Jonker, Milan Petković (eds.)


by Kevin
4.3

Rated 4.70 of 5 – based on 21 votes