Sciweavers

653 search results - page 116 / 131
» Database Privacy
Sort
View
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
15 years 6 months ago
Modeling Quality of Information in Multi-sensor Surveillance Systems
Current surveillance systems use multiple sensors and media processing techniques in order to record/detect information of interest in terms of events. Assessing the quality of in...
M. Anwar Hossain, Pradeep K. Atrey, Abdulmotaleb E...
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
15 years 6 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
FC
2005
Springer
157views Cryptology» more  FC 2005»
15 years 5 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 5 months ago
Electronic Voting Systems: Security Implications of the Administrative Workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focu...
Costas Lambrinoudakis, Spyros Kokolakis, Maria Kar...
DEXAW
1999
IEEE
105views Database» more  DEXAW 1999»
15 years 4 months ago
Personalizing the Web Using Site Descriptions
The information overload on the Web has created a great need for efficient filtering mechanisms. Many sites (e.g., CNN and Quicken) address this problem by allowing a user to crea...
Vinod Anupam, Yuri Breitbart, Juliana Freire, Bhar...