Sciweavers

6318 search results - page 1 / 1264
» Data Leakage Detection
Sort
View
TKDE
2011
182views more  TKDE 2011»
12 years 11 months ago
Data Leakage Detection
—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
13 years 11 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
IQ
2007
13 years 6 months ago
Data Quality Aspects Of Revenue Assurance
: Revenue Assurance describes a methodology to increase a company’s income by determining where revenue gets lost, and to maximize their profits by eliminating revenue leakage an...
Katharina Baamann
DMIN
2008
241views Data Mining» more  DMIN 2008»
13 years 6 months ago
Leakage Detection by Adaptive Process Modeling
Abstract-- In this paper, we propose an adaptive linear approach for time series modeling and steam line leakage detection. Weighted recursive least squares (WRLS) method is used f...
Jaakko Talonen, Miki Sirola, Jukka Parviainen
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 6 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow