Author of the publication

"Valuing" Privacy While Exposing Data Utility.

. BNCOD, volume 6121 of Lecture Notes in Computer Science, page 1-2. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive survey of numeric and symbolic outlier mining techniques., , and . Intell. Data Anal., 10 (6): 521-538 (2006)CSP with Record Data Type for Supporting Transaction Systems Specification., and . ADBIS, page 64-71. Nevsky Dialect, (1997)Attractive Interface for XML: Convincing Naive Users to Go Online., , , , , , , and . Soft Computing in XML Data Management, volume 255 of Studies in Fuzziness and Soft Computing, Springer, (2010)Capturing P3P semantics using an enforceable lattice-based structure., and . PAIS, page 4. ACM, (2011)A privacy preserving model bridging data provider and collector preferences., and . EDBT/ICDT Workshops, page 174-178. ACM, (2013)Mining web content outliers using structure oriented weighting techniques and N-grams., , and . SAC, page 482-487. ACM, (2005)Privacy-preserving big data publishing., , and . SSDBM, page 26:1-26:11. ACM, (2015)Privacy Consensus in Anonymization Systems via Game Theory., , , and . DBSec, volume 7371 of Lecture Notes in Computer Science, page 74-89. Springer, (2012)Helping Biologists Effectively Build Workflows, without Programming., , and . DILS, volume 6254 of Lecture Notes in Computer Science, page 74-89. Springer, (2010)A Data Privacy Taxonomy., , , , , , , and . BNCOD, volume 5588 of Lecture Notes in Computer Science, page 42-54. Springer, (2009)