Sökning: "Data anonymization"

Visar resultat 6 - 7 av 7 avhandlingar innehållade orden Data anonymization.

  1. 6. Security and Privacy of Sensitive Data in Cloud Computing

    Författare :Ali Gholami; Erwin Laure; Seif Haridi; Schahram Dustdar; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cloud Computing; Security; Privacy; Trust; Opertaing System; Computer Science; Datalogi;

    Sammanfattning : Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. LÄS MER

  2. 7. Privacy Mechanism Design Through the Lens of Information Theory : With Applications to Compression, Caching, and Semantic Communication

    Författare :Amirreza Zamani; Mikael Skoglund; Tobias J. Oechtering; Parastoo Sadeghi; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Privacy mechanism design; Leakage matrix; Strong privacy criterion; KL-divergence; Local approximation; Euclidean information geometry; Privacy-utility trade-off; χ2-privacy criterion; l1-privacy criterion; Common information; Functional representation lemma; Two-part construction coding; Design av sekretessmekanism; Läckagematris; Stark sekretesskriterium; KL-divergens; Lokal approximation; Euklidisk informationsgeometri; Sekretess-nyttoavvägning; χ2-sekretesskriterium; l1-sekretesskriterium; Gemensam information; Lemma för funktionell representation; Kodning med tvådelad konstruktion.; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : Privacy mechanism design is an important research area and is receiving increased attention in recent years. This field focuses on addressing the challenge of revealing general data that might have correlations with sensitive information, all while protecting this sensitive information against unauthorized access. LÄS MER