Sciweavers

6 search results - page 1 / 2
» Data Staging on Untrusted Surrogates
Sort
View
FAST
2003
13 years 6 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ď¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
AMW
2011
12 years 8 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
ER
2003
Springer
550views Database» more  ER 2003»
13 years 10 months ago
A UML Based Approach for Modeling ETL Processes in Data Warehouses
Data warehouses (DWs) are complex computer systems whose main goal is to facilitate the decision making process of knowledge workers. ETL (Extraction-Transformation-Loading) proces...
Juan Trujillo, Sergio Luján-Mora
STOC
2012
ACM
236views Algorithms» more  STOC 2012»
11 years 7 months ago
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
We propose a new notion of secure multiparty computation aided by a computationally-powerful but untrusted “cloud” server. In this notion that we call on-the-fly multiparty c...
Adriana López-Alt, Eran Tromer, Vinod Vaiku...
BMCBI
2007
123views more  BMCBI 2007»
13 years 5 months ago
Heritable clustering and pathway discovery in breast cancer integrating epigenetic and phenotypic data
Background: In order to recapitulate tumor progression pathways using epigenetic data, we developed novel clustering and pathway reconstruction algorithms, collectively referred t...
Zailong Wang, Pearlly Yan, Dustin P. Potter, Chari...