Obfuscation of sensitive data in network flows.
Daniele RiboniAntonio VillaniDomenico VitaliClaudio BettiniLuigi V. ManciniPublished in: INFOCOM (2012)
Keyphrases
- network flow
- sensitive data
- unauthorized access
- privacy preserving
- data storage
- privacy protection
- data privacy
- smart card
- third party
- information security
- minimum cost
- linear programming
- sensitive information
- data sharing
- integer programming
- malicious users
- optimization model
- privacy preservation
- protection mechanisms
- data confidentiality
- database
- high dimensional
- data mining
- bipartite graph
- access control
- data management
- np hard
- digital libraries
- social networks
- data sets