Sciweavers

1117 search results - page 140 / 224
» A Compliance Model of Trust
Sort
View
ICDE
2009
IEEE
690views Database» more  ICDE 2009»
15 years 8 months ago
A Model for Data Leakage Detection
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
16 years 3 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
EDBTW
2010
Springer
15 years 8 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim
ICEIS
2008
IEEE
15 years 8 months ago
Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Laurent Vercouter, Olivier...
122
Voted
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
15 years 8 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...