Sciweavers

922 search results - page 128 / 185
» Attribute based data sharing with attribute revocation
Sort
View
DASFAA
2007
IEEE
160views Database» more  DASFAA 2007»
15 years 4 months ago
Implementation of Bitmap Based Incognito and Performance Evaluation
In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social ...
Hyun-Ho Kang, Jae-Myung Kim, Gap-Joo Na, Sang-Won ...
ISI
2006
Springer
14 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
DMIN
2009
142views Data Mining» more  DMIN 2009»
14 years 7 months ago
Efficient Record Linkage using a Double Embedding Scheme
Record linkage is the problem of identifying similar records across different data sources. The similarity between two records is defined based on domain-specific similarity functi...
Noha Adly
BMCBI
2007
102views more  BMCBI 2007»
14 years 9 months ago
A mixture of feature experts approach for protein-protein interaction prediction
High-throughput methods can directly detect the set of interacting proteins in yeast but the results are often incomplete and exhibit high false positive and false negative rates....
Yanjun Qi, Judith Klein-Seetharaman, Ziv Bar-Josep...
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
15 years 10 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen