Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Tomoaki Mimoto"'
Autor:
Atsuko Miyaji, Tomoaki Mimoto
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical
Autor:
Tomoaki MIMOTO, Hiroyuki YOKOYAMA, Toru NAKAMURA, Takamasa ISOHARA, Masayuki HASHIMOTO, Ryosuke KOJIMA, Aki HASEGAWA, Yasushi OKUNO
Publikováno v:
IEICE Transactions on Information and Systems. :868-876
Publikováno v:
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Publikováno v:
Journal of Information Processing. 29:778-786
Publikováno v:
IEICE Transactions on Information and Systems. (2):299-308
Time-sequence data is high dimensional and contains a lot of information, which can be utilized in various fields, such as insurance, finance, and advertising. Personal data including time-sequence data is converted to anonymized datasets, which need
Autor:
Tomoaki Mimoto, Masayuki Hashimoto, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara, Ryosuke Kojima, Aki Hasegawa, Yasushi Okuno
Publikováno v:
2022 6th International Conference on Cryptography, Security and Privacy (CSP).
Autor:
Jacob C. N. Schuldt, Goichiro Hanaoka, Shinsaku Kiyomoto, Nuttapong Attrapadung, Tomoaki Mimoto
Publikováno v:
PST
Secure two-party comparison plays a crucial role in many privacy-preserving applications, such as privacy-preserving data mining and machine learning. In particular, the available comparison protocols with the appropriate input/output configuration h
Publikováno v:
TrustCom
A huge number of documents such as news articles, public reports, and personal essays has been released on websites and social media. Once documents including privacy-sensitive information are published, the risk of privacy breaches increases; thus,
Publikováno v:
Security Infrastructure Technology for Integrated Utilization of Big Data ISBN: 9789811536533
Security Infrastructure Technology for Integrated Utilization of Big Data
Security Infrastructure Technology for Integrated Utilization of Big Data
In this chapter, we introduce data anonymization techniques for several types of datasets. Data anonymity of anonymized datasets is an index for estimating the (maximum) reidentification risk from anonymized datasets and is generally defined as a qua
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::91240cd8713f0efe1de45b2eb6536809
https://doi.org/10.1007/978-981-15-3654-0_4
https://doi.org/10.1007/978-981-15-3654-0_4
Publikováno v:
PST
Time-sequence data is high dimensional and con- tains a lot of information, which can be utilized in various fields, such as insurance, finance, and advertising. Personal data including time-sequence data is often converted to anonymized datasets, wh