Results 41 to 50 of about 51,151 (259)

Resolving the Complexity of Some Data Privacy Problems

open access: yes, 2010
We formally study two methods for data sanitation that have been used extensively in the database community: k-anonymity and l-diversity. We settle several open problems concerning the difficulty of applying these methods optimally, proving both positive
Blocki, Jeremiah, Williams, Ryan
core   +1 more source

Preventing Location-Based Identity Inference in Anonymous Spatial Queries [PDF]

open access: yes, 2007
The increasing trend of embedding positioning capabilities (for example, GPS) in mobile devices facilitates the widespread use of Location-Based Services. For such applications to succeed, privacy and confidentiality are essential.
GHINITA, Gabriel   +3 more
core   +2 more sources

On the Complexity of Optimal k-Anonymity: A New Proof Based on Graph Coloring

open access: yesIEEE Access
Privacy is a complex balancing problem between risks and utility of data. K-anonymity, a fundamental model for preserving privacy, guarantees that an item cannot be differentiated from at least k-1 other items.
Yavuz Canbay
doaj   +1 more source

On the Complexity of $t$-Closeness Anonymization and Related Problems

open access: yes, 2013
An important issue in releasing individual data is to protect the sensitive information from being leaked and maliciously utilized. Famous privacy preserving principles that aim to ensure both data privacy and data integrity, such as $k$-anonymity and $l$
D. Rebollo-Monedero   +10 more
core   +1 more source

Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks [PDF]

open access: yes, 2009
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-tomany structures are evolved due to need for conveying collected event information to ...
Bahsi, Hayretdin   +2 more
core   +1 more source

Time Distortion Anonymization for the Publication of Mobility Data with High Utility [PDF]

open access: yes, 2015
An increasing amount of mobility data is being collected every day by different means, such as mobile applications or crowd-sensing campaigns. This data is sometimes published after the application of simple anonymization techniques (e.g., putting an ...
Brunie, Lionel   +3 more
core   +3 more sources

Real‐World Investigation of Satralizumab in Patients With Neuromyelitis Optica Spectrum Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Satralizumab, a monoclonal antibody targeting the interleukin‐6 receptor, has demonstrated efficacy in clinical trials for neuromyelitis optica spectrum disorder (NMOSD). However, its real‐world effectiveness and safety compared to conventional immunosuppressive therapies remain uncertain.
Li‐Tsung Lin   +2 more
wiley   +1 more source

Distinguishable de-identified faces [PDF]

open access: yes, 2015
The k-anonymity approach adopted by k-Same face de-identification methods enables these methods to serve their purpose of privacy protection. However, it also forces every k original faces to share the same de-identified face, making it impossible to ...
Ariyaeeinia, A., Meng, Li, Sun, Zongji
core   +1 more source

Neuropsychiatric Symptoms Mimicking Dementia in a Patient Treated With Imatinib

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Tyrosine kinase inhibitors are the cornerstone of chronic myeloid leukemia treatment. Newer agents have more potency and a broader spectrum of action, but also a higher potential for neuropsychiatric side effects. We present a case of a patient on imatinib who developed progressive cognitive, mood, and behavioral alterations.
Ashley Jones   +3 more
wiley   +1 more source

The k-Anonymity Problem Is Hard [PDF]

open access: yes, 2009
21 pages, A short version of this paper has been accepted in FCT 2009 - 17th International Symposium on Fundamentals of Computation ...
Bonizzoni, P, Della Vedova, G, Dondi, R
openaire   +3 more sources

Home - About - Disclaimer - Privacy