Sciweavers

2386 search results - page 251 / 478
» Database Security 2000
Sort
View
113
Voted
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 5 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
ADC
2007
Springer
107views Database» more  ADC 2007»
15 years 5 months ago
A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery
XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, we address how to optimally query encrypted XML documents usin...
Tao-Ku Chang, Gwan-Hwan Hwang
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
15 years 5 months ago
PRIVATE-IYE: A Framework for Privacy Preserving Data Integration
Data integration has been a long standing challenge to the database and data mining communities. This need has become critical in numerous contexts, including building e-commerce ...
Sourav S. Bhowmick, Le Gruenwald, Mizuho Iwaihara,...
ISI
2004
Springer
15 years 4 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
COMPSAC
2005
IEEE
15 years 1 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin