Sciweavers

3651 search results - page 30 / 731
» Data Mining for Security Applications
Sort
View
95
Voted
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
15 years 2 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
SAC
2008
ACM
14 years 9 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ACSW
2007
14 years 11 months ago
Securing Grid Data Using Mandatory Access Controls
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particu...
Matthew Henricksen, William J. Caelli, Peter R. Cr...
71
Voted
SIGKDD
2000
87views more  SIGKDD 2000»
14 years 10 months ago
Integrating Data Mining into Vertical Solutions
At KDD-99, the panel on Integrating Data Mining into Vertical Solutions addressed a series of questions regarding future trends in industrial applications. Panelists were chosen t...
Ron Kohavi, Mehran Sahami
81
Voted
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 5 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...