Sciweavers

1906 search results - page 179 / 382
» Data Privacy
Sort
View
133
Voted
SPW
2004
Springer
15 years 9 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
214
Voted
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
16 years 5 months ago
InstantDB: Enforcing Timely Degradation of Sensitive Data
- People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy v...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
136
Voted
CDVE
2007
Springer
165views Visualization» more  CDVE 2007»
15 years 9 months ago
Private Data Management in Collaborative Environments
Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of informatio...
Larry Korba, Ronggong Song, George Yee, Andrew S. ...
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 10 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
103
Voted
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
15 years 9 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...