Sciweavers

365 search results - page 48 / 73
» Determining Internet Users' Values for Private Information
Sort
View
VLDB
2008
ACM
148views Database» more  VLDB 2008»
15 years 10 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
P2P
2010
IEEE
132views Communications» more  P2P 2010»
14 years 8 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
DIMVA
2006
14 years 11 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
ICDE
2004
IEEE
115views Database» more  ICDE 2004»
15 years 11 months ago
Go Green: Recycle and Reuse Frequent Patterns
In constrained data mining, users can specify constraints that can be used to prune the search space to avoid mining uninteresting knowledge. Since it is difficult to determine th...
Gao Cong, Beng Chin Ooi, Kian-Lee Tan, Anthony K. ...
ICDE
2010
IEEE
243views Database» more  ICDE 2010»
15 years 9 months ago
Probabilistic Contextual Skylines
The skyline query returns the most interesting tuples according to a set of explicitly defined preferences among attribute values. This work relaxes this requirement, and allows us...
Anastasios Arvanitis, Dimitris Sacharidis, Timos K...