Team for Research in
Ubiquitous Secure Technology

Ensuring Privacy and Longevity of Sensitive Data
Bobji Mungamuru and Hector Garcia-Molina

Citation
Bobji Mungamuru and Hector Garcia-Molina. "Ensuring Privacy and Longevity of Sensitive Data". Talk or presentation, 27, April, 2006; Poster given at Trust NSF Site Visit.

Abstract
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We answer the question of how to design a system that simultaneously provides both good privacy and good longevity. We define the notion of a "configuration" to describe how a system is protected, and we develop a process for searching for configurations that provide a good balance between privacy and longevity.

Electronic downloads

Citation formats  
  • HTML
    Bobji Mungamuru and Hector Garcia-Molina. <a
    href="http://www.truststc.org/pubs/76.html"
    ><i>Ensuring Privacy and Longevity of Sensitive
    Data</i></a>, Talk or presentation,  27, April,
    2006; Poster given at Trust NSF Site Visit.
  • Plain text
    Bobji Mungamuru and Hector Garcia-Molina. "Ensuring
    Privacy and Longevity of Sensitive Data". Talk or
    presentation,  27, April, 2006; Poster given at Trust NSF
    Site Visit.
  • BibTeX
    @presentation{MungamuruGarciaMolina06_EnsuringPrivacyLongevityOfSensitiveData,
        author = {Bobji Mungamuru and Hector Garcia-Molina},
        title = {Ensuring Privacy and Longevity of Sensitive Data},
        day = {27},
        month = {April},
        year = {2006},
        note = {Poster given at Trust NSF Site Visit},
        abstract = {In order to safeguard a sensitive database, we
                  must ensure both its privacy and its longevity.
                  However, privacy and longevity tend to be
                  competing objectives. We answer the question of
                  how to design a system that simultaneously
                  provides both good privacy and good longevity. We
                  define the notion of a "configuration" to describe
                  how a system is protected, and we develop a
                  process for searching for configurations that
                  provide a good balance between privacy and
                  longevity.},
        URL = {http://www.truststc.org/pubs/76.html}
    }
    

Posted by Christopher Brooks on 4 May 2006.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.