Downloads: 110 | Views: 297
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015 | Popularity: 6.7 / 10
A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data
Pratik Bhingardeve, D. H. Kulkarni
Abstract: Data privacy problems square measure more and more turning into vital for several applications. Access management mechanisms give protection to our sensitive business information from unwanted user. Resource and information sharing is additional and crucial part of our daily life and business. Essentially analysis within the data processing or information mining with sub space of information security is loosely classified into access management analysis and data privacy analysis. Each plays vital role in information security thence we've integrated these methodologies to boost our security on relative information. Mistreatment privacy protective mechanism we will generalize and suppress our relative information to anonymize and satisfy privacy needs against identity and attribute speech act. We've not solely collective these methodologies however we've conjointly provided further security by mistreatment encryption that wasn't gift in previous system.
Keywords: Workload aware anonymization, Access control, privacy, l-diversity
Edition: Volume 4 Issue 2, February 2015
Pages: 2347 - 2349
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022
Pages: 1007 - 1011Cloud Computing in Science and Technology: A Review
Rupinder Kaur