Sign in
Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy.
Ata Turk
Mayank Varia
Georgios Kellaris
Published in:
ICDM Workshops (2017)
Keyphrases
</>
user privacy
privacy preservation
privacy preserving
cloud computing
identity management
malicious users
private information
access control
database
training set
location based services
association rules