↓ Skip to main content

ICT Systems Security and Privacy Protection

Overview of attention for book
Cover of 'ICT Systems Security and Privacy Protection'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Turning Active TLS Scanning to Eleven
  3. Altmetric Badge
    Chapter 2 Slow TCAM Exhaustion DDoS Attack
  4. Altmetric Badge
    Chapter 3 Evasive Malware Detection Using Groups of Processes
  5. Altmetric Badge
    Chapter 4 A Malware-Tolerant, Self-Healing Industrial Control System Framework
  6. Altmetric Badge
    Chapter 5 Process Discovery for Industrial Control System Cyber Attack Detection
  7. Altmetric Badge
    Chapter 6 Secure Photo Sharing in Social Networks
  8. Altmetric Badge
    Chapter 7 Context-Dependent Privacy-Aware Photo Sharing Based on Machine Learning
  9. Altmetric Badge
    Chapter 8 3LP: Three Layers of Protection for Individual Privacy in Facebook
  10. Altmetric Badge
    Chapter 9 A Framework for Moving Target Defense Quantification
  11. Altmetric Badge
    Chapter 10 Query Privacy in Sensing-as-a-Service Platforms
  12. Altmetric Badge
    Chapter 11 Secure and Efficient k-NN Queries
  13. Altmetric Badge
    Chapter 12 Secure and Trustable Distributed Aggregation Based on Kademlia
  14. Altmetric Badge
    Chapter 13 HyBIS: Advanced Introspection for Effective Windows Guest Protection
  15. Altmetric Badge
    Chapter 14 Detection of Side Channel Attacks Based on Data Tainting in Android Systems
  16. Altmetric Badge
    Chapter 15 The Fuzzing Awakens: File Format-Aware Mutational Fuzzing on Smartphone Media Server Daemons
  17. Altmetric Badge
    Chapter 16 Towards Automated Classification of Firmware Images and Identification of Embedded Devices
  18. Altmetric Badge
    Chapter 17 Runtime Firmware Product Lines Using TPM2.0
  19. Altmetric Badge
    Chapter 18 On the Use of Emojis in Mobile Authentication
  20. Altmetric Badge
    Chapter 19 EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart
  21. Altmetric Badge
    Chapter 20 Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud
  22. Altmetric Badge
    Chapter 21 Capturing Policies for BYOD
  23. Altmetric Badge
    Chapter 22 Improving Blind Steganalysis in Spatial Domain Using a Criterion to Choose the Appropriate Steganalyzer Between CNN and SRM+EC
  24. Altmetric Badge
    Chapter 23 BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables
  25. Altmetric Badge
    Chapter 24 Decoy Password Vaults: At Least as Hard as Steganography?
  26. Altmetric Badge
    Chapter 25 Election-Dependent Security Evaluation of Internet Voting Schemes
  27. Altmetric Badge
    Chapter 26 Combating Control Flow Linearization
  28. Altmetric Badge
    Chapter 27 Ghost Patches: Fake Patches for Fake Vulnerabilities
  29. Altmetric Badge
    Chapter 28 SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference
  30. Altmetric Badge
    Chapter 29 Towards Systematic Privacy and Operability (PRIOP) Studies
  31. Altmetric Badge
    Chapter 30 Data Minimisation: A Language-Based Approach
  32. Altmetric Badge
    Chapter 31 Differentially Private Neighborhood-Based Recommender Systems
  33. Altmetric Badge
    Chapter 32 Privacy-Enhanced Profile-Based Authentication Using Sparse Random Projection
  34. Altmetric Badge
    Chapter 33 Supporting Privacy by Design Using Privacy Process Patterns
  35. Altmetric Badge
    Chapter 34 Evaluating the Privacy Implications of Frequent Itemset Disclosure
  36. Altmetric Badge
    Chapter 35 Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers
  37. Altmetric Badge
    Chapter 36 RiskInDroid: Machine Learning-Based Risk Analysis on Android
  38. Altmetric Badge
    Chapter 37 Using Fraud Patterns for Fraud Risk Assessment of E-services
  39. Altmetric Badge
    Chapter 38 Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks
Attention for Chapter 34: Evaluating the Privacy Implications of Frequent Itemset Disclosure
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Evaluating the Privacy Implications of Frequent Itemset Disclosure
Chapter number 34
Book title
ICT Systems Security and Privacy Protection
Published in
ICT systems security and privacy protection : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings. IFIP TC11 International Information Security Conference (32nd : 2017 : Rome, Italy), May 2017
DOI 10.1007/978-3-319-58469-0_34
Pubmed ID
Book ISBNs
978-3-31-958468-3, 978-3-31-958469-0
Authors

Edoardo Serra, Jaideep Vaidya, Haritha Akella, Ashish Sharma

Abstract

Frequent itemset mining is a fundamental data analytics task. In many cases, due to privacy concerns, only the frequent itemsets are released instead of the underlying data. However, it is not clear how to evaluate the privacy implications of the disclosure of the frequent item-sets. Towards this, in this paper, we define the k-distant-IFM-solutions problem, which aims to find k transaction datasets whose pair distance is maximized. The degree of difference between the reconstructed datasets provides a way to evaluate the privacy risk. Since the problem is NP-hard, we propose a 2-approximate solution as well as faster heuristics, and evaluate them on real data.

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 1 100%
Readers by discipline Count As %
Computer Science 1 100%