Sciweavers

2001 search results - page 40 / 401
» A security architecture for data privacy and security
Sort
View
CCS
2006
ACM
15 years 3 months ago
Privacy-preserving semantic interoperation and access control of heterogeneous databases
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalak...
ACSAC
2007
IEEE
15 years 6 months ago
An Overview of the Annex System
This paper describes the security and network architecture of the Annex system, a family of technologies for secure and pervasive communication and information processing that we ...
Duncan A. Grove, Toby C. Murray, C. A. Owen, Chris...
TRUSTBUS
2004
Springer
15 years 5 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
MDAI
2009
Springer
15 years 6 months ago
The Functionality-Security-Privacy Game
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achi...
Josep Domingo-Ferrer
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 13 hour ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton