Sign in

Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy.

Ata TurkMayank VariaGeorgios Kellaris
Published in: ICDM Workshops (2017)
Keyphrases
  • user privacy
  • privacy preservation
  • privacy preserving
  • cloud computing
  • identity management
  • malicious users
  • private information
  • access control
  • database
  • training set
  • location based services
  • association rules