Projectes per any
Resum
When considering data provenance some problems arise from the need to safely handle provenance related functionality. If some modifications have to be performed in a data set due to provenance related requirements, e.g. remove data from a given user or source, this will affect not only the data itself but also all related models and aggregated information obtained from the data. This is specially aggravated when the data are protected using a privacy method (e.g. masking method), since modification in the data and the model can leak information originally protected by the privacy method. To be able to evaluate privacy related problems in data provenance we introduce the notion of integral privacy as compared to the well known definition of differential privacy.
| Idioma original | Anglès |
|---|---|
| Títol de la publicació | Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings |
| Lloc de publicació | Cham: |
| Editor | Springer, Cham |
| Pàgines | 661-669 |
| Nombre de pàgines | 9 |
| Edició | 2016 |
| ISBN (electrònic) | 978-3-319-48965-0 |
| DOIs | |
| Estat de la publicació | Publicada - 2016 |
Fingerprint
Navegar pels temes de recerca de 'Integral privacy'. Junts formen un fingerprint únic.Projectes
- 1 Acabat
-
Seguridad para mobile crowd sensing con protocolos oportunistas
Navarro Arribas, G. (Investigador/a principal), Robles Martinez, S. (Co-Investigador/a Principal), Borrego Iglesias, C. (Col.laborador/a), Fabregues Vinent, A. (Col.laborador/a), Borrell Viader, J. (Investigador/a), Herrera Joancomarti, J. (Investigador/a) & Marti Escale, R. (Investigador/a)
1/01/15 → 30/06/18
Projecte: Projectes i Ajuts a la Recerca