• Aucun résultat trouvé

Data Anonymization: The Challenge from Theory to Practice

N/A
N/A
Protected

Academic year: 2022

Partager "Data Anonymization: The Challenge from Theory to Practice"

Copied!
1
0
0

Texte intégral

(1)

Data Anonymization: The Challenge from Theory to Practice

Ting Yu

Department of Computer Science North Carolina State University

Raleigh, North Carolina, USA

yu@csc.ncsu.edu

BIO

Ting Yu is an associate professor in the Department of Computer Science of North Carolina State University, and a senior scientist in the cyber security group of Qatar Computing Research Institute (QCRI). His main research areas are in data privacy and anonymization, trustworthy information in open systems and trust management. He obtained his Ph.D. in computer science from the University of Illinois at Urbana Champaign in 2003. Ting Yu is a recipient of the NSF CAREER Award in 2007 for trust and privacy management in social networks, and a recipient of the scholarship of K.C. Wong Education Foundation, Hong Kong in 2010.

(c) 2014, Copyright is with the authors. Published in the Workshop Proceedings of the EDBT/ICDT 2014 Joint Conference (March 28, 2014, Athens, Greece) on CEUR-WS.org (ISSN 1613-0073).

Distribution of this paper is permitted under the terms of the Creative Commons license CC-by-nc-nd 4.0

7th International Workshop on Privacy and Anonymity in the Information Society (PAIS’14) March 28, 2014, Athens, Greece

415

Références

Documents relatifs

(Note, though, that the number of training patterns seen before this maximum number of mistakes is made might be much greater.) This theoretical (and very impractical!) result (due

Brief teaching and research profile: Research and teaching within the area of mathematical programming and discrete mathematics. The teaching will be principally within the

This issue of Revue Roumaine de Mathematiques Pures et Appliquees is dedicated to Professor Serban Stratila, on the occasion of his 70th birthday in June 2013, in appreciation for

In this paper we present how such data can be transformed into relational data, introduce a novel approach for anonymization of IPv4 address in our dataset using several

The Group Methodology of Using Cloud Technologies in the Training of Future Computer Science Teachers.. Oleg Spirin 1 [0000-0002-9594-6602] , Vasyl Oleksiuk 2 [0000-0003-2206-8447]

Combining the tools and the approach facilitated the creation of a learning environment in which use of technology and the choice of activities centered on a problem provided

Thus, software systems (like, e.g., AProVE, CiME, or TTT) which are able to generate constraints for obtaining polynomial interpretations over the naturals which prove termination

 Upper ontologies are high-level, domain-independent ontologies that provide common knowledge bases from which more domain-specific ontologies may be derived.