Sciweavers

653 search results - page 77 / 131
» Database Privacy
Sort
View
90
Voted
JDM
2000
128views more  JDM 2000»
15 years 2 months ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
142
Voted
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 3 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
144
Voted
TMM
2002
133views more  TMM 2002»
15 years 2 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
144
Voted
ICDCS
2009
IEEE
15 years 12 days ago
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases
The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
ACNS
2010
Springer
114views Cryptology» more  ACNS 2010»
15 years 6 months ago
Two New Efficient PIR-Writing Protocols
Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client's database is encrypted by his secret key. Duri...
Helger Lipmaa, Bingsheng Zhang