Sciweavers

733 search results - page 3 / 147
» Private inference control
Sort
View
WPES
2003
ACM
13 years 11 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 3 days ago
QoS Aware Dynamic Flow Control in Virtual Private Network
— In recent years, IP based Virtual Private Networks (IP-VPNs) which enables enterprises to dynamically create and manage privately owned virtual networks over the public network...
Fariza Sabrina, Glynn Rogers
DEBS
2009
ACM
14 years 9 days ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
13 years 11 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li