Sciweavers

SDMW
2004
Springer
13 years 10 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
SDMW
2004
Springer
13 years 10 months ago
Abstracting and Refining Authorization in SQL
ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to unders...
Arnon Rosenthal, Edward Sciore
SDMW
2004
Springer
13 years 10 months ago
Achieving Privacy Preservation when Sharing Data for Clustering
Abstract. In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements an...
Stanley R. M. Oliveira, Osmar R. Zaïane
SDMW
2004
Springer
13 years 10 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...
SDMW
2004
Springer
13 years 10 months ago
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms
Abstract. Due to the growing interest in XML security, various access control schemes have been proposed recently. However, little effort has been put forth to facilitate a unifor...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
SDMW
2004
Springer
13 years 10 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
SDMW
2004
Springer
13 years 10 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
SDMW
2004
Springer
13 years 10 months ago
A Structure Preserving Database Encryption Scheme
Abstract. A new simple and efficient database encryption scheme is presented. The new scheme enables encrypting the entire content of the database without changing its structure. I...
Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehu...
SDMW
2004
Springer
13 years 10 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
SDMW
2004
Springer
13 years 10 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...