Sciweavers

2386 search results - page 288 / 478
» Database Security 2000
Sort
View
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
15 years 1 months ago
Fingerprint and On-Line Signature Verification Competitions at ICB 2009
This paper describes the objectives, the tasks proposed to the participants and the associated protocols in terms of database and assessment tools of two present competitions on fi...
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferr...
DBSEC
2011
233views Database» more  DBSEC 2011»
14 years 6 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
181
Voted
EGOV
2011
Springer
14 years 3 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson
ICDE
2003
IEEE
130views Database» more  ICDE 2003»
16 years 4 months ago
StegFS: A Steganographic File System
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence ...
HweeHwa Pang, Kian-Lee Tan, Xuan Zhou
113
Voted
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 3 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...