Recovering private data : a comparison of three methods
conference contribution
posted on 2012-01-01, 00:00authored byKalpana Singh
We examine a recent proposal for data privatization by testing it agalnst three well-known attacks. We show that all three attacks successfully retrieve the original datta. We compare the strengths of the three attacks. Finally, we indicate how the data privatization method examined can be modified to assist it to withstand these attacks.
History
Event
Applications and Technologies in Information Security. Workshop (3rd : 2012 : Melbourne, Vic.)
Pagination
24 - 25
Publisher
School of Information Systems, Deakin University
Location
Melbourne, Vic.
Place of publication
Melbourne, Vic.
Start date
2012-11-07
ISBN-13
9780987229823
Language
eng
Publication classification
E2 Full written paper - non-refereed / Abstract reviewed
Editor/Contributor(s)
M Warren
Title of proceedings
ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop