Sciweavers

653 search results - page 97 / 131
» Database Privacy
Sort
View
DEBU
2002
81views more  DEBU 2002»
15 years 1 months ago
Profiling and Service Delivery in Internet-enabled Cars
This paper presents our experience applying web services and active database technology in an automotive scenario. Particularly, we concentrate on developing an infrastructure for...
Mariano Cilia, Alejandro P. Buchmann
TCC
2005
Springer
95views Cryptology» more  TCC 2005»
15 years 7 months ago
Keyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are ...
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Om...
ICDE
2010
IEEE
359views Database» more  ICDE 2010»
16 years 1 months ago
Policy-Aware Sender Anonymity in Location Based Services
Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
SSD
2009
Springer
141views Database» more  SSD 2009»
15 years 8 months ago
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
Abstract. Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, howev...
Kar Way Tan, Yimin Lin, Kyriakos Mouratidis
ACSAC
2008
IEEE
15 years 8 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...