• Publications
  • Influence
Perspectives of Australian adults about protecting the privacy of their health information in statistical databases
TLDR
The study showed that there are some particularly sensitive issues and there is a concern about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment, and improving privacy protection of personal information by introducing additional security measures in data publishing. Expand
Multi-guarded safe zone: An effective technique to monitor moving circular range queries
TLDR
A technique based on powerful pruning rules and a unique access order is proposed which efficiently computes the safe zone and minimizes the I/O cost and is an order of magnitude faster than a naïve algorithm. Expand
Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules
TLDR
It is argued that in data mining the major requirement of security control mechanism is not to ensure precise and bias-free statistics, but rather to preserve the high-level descriptions of knowledge constructed by artificial data mining tools. Expand
Continuous Monitoring of Distance-Based Range Queries
TLDR
A technique based on powerful pruning rules and a unique access order which efficiently computes the safe zone and minimizes the I/O cost is proposed and is up to two order of magnitude faster than a naïve algorithm. Expand
A Framework for Privacy Preserving Classification in Data Mining
TLDR
A noise addition framework specifically tailored towards the classification task in data mining that builds upon some previous techniques that introduce noise to the class and the so-called innocent attributes and caters for the preservation of the variances and covariances, along with patterns, thus making the perturbed dataset useful for both statistical and data mining purposes. Expand
Usability of compromise-free statistical databases
TLDR
New results concerning the usability of secure statistical databases for general SUM, COUNT and MEAN queries, as well as for the corresponding range queries, are presented. Expand
Combining Two Worlds: Parameterised Approximation for Vertex Cover
TLDR
A simple algorithm that works on any approximation ratio of the form \(\frac {2l+1}{l-1}\) and has complexity that outperforms an algorithm by Bourgeois et al. Expand
BIM : expectations and a reality check
TLDR
The paper analyses the readiness of the building industry with respect to the product, processes and people to present an argument on where the expectations from BIM and its adoption may have been misplaced. Expand
Privacy preserving data mining: A noise addition framework using a novel clustering technique
TLDR
A framework that uses a few novel noise addition techniques for protecting individual privacy while maintaining a high data quality is presented and a security analysis is presented for measuring the security level of a data set. Expand
An Overview of Security Issues and Techniques in Mobile Agents
TLDR
This paper gives an overview of the main security issues related to the mobile agent paradigm, including security threats, requirements, and techniques for keeping the mobileAgent platform and the agent itself secure against each other. Expand
...
1
2
3
4
5
...