Sciweavers

62 search results - page 1 / 13
» Competitive Privacy: Secure Analysis on Integrated Sequence ...
Sort
View
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
13 years 9 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
ISI
2008
Springer
13 years 3 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
ISI
2005
Springer
13 years 10 months ago
Integrating Private Databases for Data Analysis
In today’s globally networked society, there is a dual demand on both information sharing and information protection. A typical scenario is that two parties wish to integrate the...
Ke Wang, Benjamin C. M. Fung, Guozhu Dong
NDSS
2006
IEEE
13 years 10 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
13 years 10 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya