Sciweavers

1779 search results - page 45 / 356
» A Formal Model of Data Privacy
Sort
View
IEEEARES
2006
IEEE
15 years 7 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
VLDB
2008
ACM
148views Database» more  VLDB 2008»
16 years 1 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
CCS
2009
ACM
16 years 2 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
TKDE
2012
215views Formal Methods» more  TKDE 2012»
13 years 3 months ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...
BPM
2007
Springer
201views Business» more  BPM 2007»
15 years 7 months ago
Towards Formal Analysis of Artifact-Centric Business Process Models
Abstract. Business process (BP) modeling is a building block for design and management of business processes. Two fundamental aspects of BP modeling are: a formal framework that we...
Kamal Bhattacharya, Cagdas Evren Gerede, Richard H...