Sciweavers

208 search results - page 1 / 42
» Privacy-Preserving Sharing of Sensitive Information
Sort
View
IEEESP
2010
126views more  IEEESP 2010»
13 years 3 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ESORICS
2008
Springer
13 years 6 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
ICDE
2005
IEEE
121views Database» more  ICDE 2005»
14 years 5 months ago
Top-Down Specialization for Information and Privacy Preservation
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical and efficient algorithm for determining a generaliz...
Benjamin C. M. Fung, Ke Wang, Philip S. Yu
ISI
2004
Springer
13 years 10 months ago
Privacy-Preserving Inter-database Operations
Abstract. We present protocols for distributed computation of relational intersections and equi-joins such that each site gains no information about the tuples at the other site th...
Gang Liang, Sudarshan S. Chawathe