Sciweavers

80 search results - page 13 / 16
» Constant-Round Private Database Queries
Sort
View
VLDB
2008
ACM
148views Database» more  VLDB 2008»
15 years 9 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
15 years 9 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
OODBS
1992
80views Database» more  OODBS 1992»
15 years 1 months ago
Object Algebra and Views for Multi-Objectbases
This paper addresses the problem of de ning views that span several objectbases. Views are expressed in terms of an object algebra. We are interested in the degrees of coupling an...
Marc H. Scholl, Hans-Jörg Schek, Markus Tresc...
PET
2010
Springer
14 years 11 months ago
Achieving Efficient Query Privacy for Location Based Services
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations...
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg,...
83
Voted
CCS
2011
ACM
13 years 9 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg