Sciweavers

1906 search results - page 255 / 382
» Data Privacy
Sort
View
DFMA
2005
IEEE
206views Multimedia» more  DFMA 2005»
15 years 9 months ago
A Collaborative Extension of a Visualization System
This paper presents an extension of the single-user scientific visualization system ZoomIn to a collaborative system. We discuss the principal challenges of remote collaboration i...
Steve Casera, Hans-Heinrich Nägeli, Peter Kro...
ICDM
2005
IEEE
157views Data Mining» more  ICDM 2005»
15 years 9 months ago
Blocking Anonymity Threats Raised by Frequent Itemset Mining
In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty o...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
ADMA
2006
Springer
137views Data Mining» more  ADMA 2006»
15 years 7 months ago
SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases
Abstract. The issue of maintaining privacy in frequent itemset mining has attracted considerable attentions. In most of those works, only distorted data are available which may bri...
Jinlong Wang, Congfu Xu, Hongwei Dan, Yunhe Pan
ACSAC
1999
IEEE
15 years 8 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
IEEEARES
2009
IEEE
15 years 10 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...