2013 Eleventh Annual Conference on Privacy, Security and Trust 2013
DOI: 10.1109/pst.2013.6596036
|View full text |Cite
|
Sign up to set email alerts
|

Blend me in: Privacy-preserving input generalization for personalized online services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…One way to minimize the damage from data leakage is to not communicate it, or to distort it [2][3] [4]. In the present work we assume that the recipient requires the real data, as would almost certainly be the case for medical or financial transactions.…”
Section: A Control Of Data After It Is Transmittedmentioning
confidence: 99%
“…One way to minimize the damage from data leakage is to not communicate it, or to distort it [2][3] [4]. In the present work we assume that the recipient requires the real data, as would almost certainly be the case for medical or financial transactions.…”
Section: A Control Of Data After It Is Transmittedmentioning
confidence: 99%
“…As for other applications in this area, PTTA access control is ensured by usernames and passwords, with the possible addition of unique IDs assigned by physicians, as mentioned above. Also, as suggested in [1], we will evaluate the extent to which exact values of Personal Identifiable Information (PII) are needed to provide useful targeted information. When the results do not depend upon exact values we will employ input generalization [1].…”
Section: Privacy and Securitymentioning
confidence: 99%
“…Also, as suggested in [1], we will evaluate the extent to which exact values of Personal Identifiable Information (PII) are needed to provide useful targeted information. When the results do not depend upon exact values we will employ input generalization [1]. We encrypt the PII with the Advanced Encryption Standard (AES) algorithm and store it separately from non-PII (literature-based data).…”
Section: Privacy and Securitymentioning
confidence: 99%