Sciweavers

922 search results - page 71 / 185
» Attribute based data sharing with attribute revocation
Sort
View
AAAI
2000
15 years 1 months ago
Untangle: A New Ontology for Card Catalog Systems
The ontology used by most card catalog and bibliographic systems is based on a now outdated assumption that users of the systems would be looking for books on shelves, and therefo...
Christopher A. Welty, Jessica Jenkins
TREC
2007
15 years 1 months ago
DUTIR at TREC 2007 Blog Track
This paper describes DUTIR at TREC 2007 Blog Track. In data preprocessing, a non English language list created from the corpus was used to remove the non English blogs, blog templ...
Rui Song, Qin Tang, Daming Shi 0002, Hongfei Lin, ...
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 10 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
16 years 7 days ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
VLDB
2002
ACM
116views Database» more  VLDB 2002»
14 years 11 months ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan