Sciweavers

1906 search results - page 150 / 382
» Data Privacy
Sort
View
STORAGESS
2005
ACM
15 years 9 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
DAWAK
2006
Springer
15 years 7 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 7 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
208
Voted
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
16 years 4 months ago
MultiRelational k-Anonymity
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much...
Mehmet Ercan Nergiz, Chris Clifton, A. Erhan Nergi...
145
Voted
ACSAC
2006
IEEE
15 years 7 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...