Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance.
Johannes SchneiderBin LuThomas LocherYvonne-Anne PignoletMatús HarvanSebastian ObermeierPublished in: SECRYPT (2016)
Keyphrases
- access patterns
- data confidentiality
- information leakage
- prefetching
- user privacy
- disclosure control
- personal information
- privacy preserving
- security properties
- web users
- file system
- web usage mining
- private information
- access control
- access logs
- web log data
- statistical agencies
- confidential data
- statistical databases
- web logs
- sensitive information
- sensitive data
- machine learning
- information security
- differential privacy
- information loss
- sequential patterns
- social network analysis
- response time