Learn More
User-private information retrieval systems should protect the user's anonymity when performing queries against a database, or they should limit the servers capacity of profiling users. Peer-to-peer user-private information retrieval (P2P UPIR) supplies a practical solution: the users in a group help each other in doing their queries, thereby preserving(More)
BACKGROUND Ischaemia-reperfusion injury is mediated by neutrophil-endothelial interaction. Induction of heat shock proteins attenuates neutrophil-endothelial interactions. The aim of this study was to determine whether thermal preconditioning could have a protective effect on neutrophil-mediated lung injury in an animal model of lower torso(More)
In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k-anonymity. After a short survey on the different available definitions of k-anonymity for graphs we provide a new definition for k-anonymous(More)
User-private information retrieval (UPIR) is the art of retrieving information without telling the information holder who you are. UPIR is sometimes called anonymous keyword search. This article discusses a UPIR protocol in which the users form a peer-to-peer network over which they collaborate in protecting the privacy of each other. The protocol is known(More)
Thermotolerance describes the process in which hyperthermia induces a transient resistance of the stressed cells to subsequent episodes of oxidative stress. The aims of this study were first, to assess the effect of ischemia-reperfusion (IR) injury on renal function and the expression of the ICAM-1 receptor and MHC antigens, and second, to evaluate the(More)
—In this paper we discuss some tools for graph perturbation with applications to data privacy. We present and analyse two different approaches. One is based on matrix decomposition and the other on graph partitioning. We discuss these methods and show that they belong to two traditions in data protection: noise addition/microaggregation and k-anonymity. I.(More)
We provide a formal framework for re-identification in general. We define <i>n</i>-confusion as a concept for modelling the anonymity of a database table and we prove that <i>n</i>-confusion is a generalization of <i>k</i>-anonymity. Finally we present an example to illustrate how this result can be used to augment local variance in <i>k</i>-anonymous(More)
Leukocyte-endothelial interaction is a pivotal step in the pathogenesis of ischemia-reperfusion (I/R) injury. Exposure of cells to a subcritical heat stress may protect cells from subsequent I/R injury, through induction of a 72-kDa heat shock protein (HSP72). The aim of this study was to investigate the effect of thermotolerance on leukocyte adherence and(More)