Anonymity meets game theory: secure data integration with malicious participants.
Noman MohammedBenjamin C. M. FungMourad DebbabiPublished in: VLDB J. (2011)
Keyphrases
- data integration
- game theory
- game theoretic
- data exchange
- data management
- data model
- data sources
- databases
- cooperative
- data sharing
- resource allocation
- data warehouse
- nash equilibrium
- multi agent systems
- multi agent learning
- heterogeneous data
- data transformation
- nash equilibria
- query answering
- biological databases
- privacy protection
- fictitious play
- data cleaning
- mechanism design
- statistical physics
- sensitive data
- schema mappings
- heterogeneous data sources
- query decomposition
- cooperative game theory
- scientific data management
- query language
- business intelligence
- data sets
- data integration systems
- integrity constraints