Sciweavers

922 search results - page 58 / 185
» Attribute based data sharing with attribute revocation
Sort
View
AUSAI
2008
Springer
15 years 1 months ago
L-Diversity Based Dynamic Update for Large Time-Evolving Microdata
Data anonymization techniques based on enhanced privacy principles have been the focus of intense research in the last few years. All existing methods achieving privacy principles ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
TKDE
2008
122views more  TKDE 2008»
14 years 11 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
WEBI
2009
Springer
15 years 6 months ago
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities
Information sharing is a key objective in the age of Internet and virtual communities. Reputation information is an important part of a user’s identity and is both a sensitive a...
Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud ...
TKDE
2011
168views more  TKDE 2011»
14 years 6 months ago
On Computing Farthest Dominated Locations
—In reality, spatial objects (e.g., hotels) not only have spatial locations but also have quality attributes (e.g., price, star). An object p is said to dominate another one p , ...
Hua Lu, Man Lung Yiu
DCOSS
2008
Springer
15 years 1 months ago
Multi-root, Multi-Query Processing in Sensor Networks
Sensor networks can be viewed as large distributed databases, and SQL-like high-level declarative languages can be used for data and information retrieval. Energy constraints make ...
Zhiguo Zhang, Ajay D. Kshemkalyani, Sol M. Shatz