Sciweavers

653 search results - page 72 / 131
» Database Privacy
Sort
View
103
Voted
AINA
2006
IEEE
15 years 8 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi
107
Voted
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 3 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
112
Voted
DMKD
2004
ACM
115views Data Mining» more  DMKD 2004»
15 years 8 months ago
Privacy-preserving data integration and sharing
Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume ...
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gun...
127
Voted
IJMI
2007
140views more  IJMI 2007»
15 years 2 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ACSAC
2002
IEEE
15 years 7 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...