Sciweavers

2719 search results - page 78 / 544
» Exposing Application Alternatives
Sort
View
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 11 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
15 years 11 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
ICDCSW
2006
IEEE
15 years 11 months ago
Benchmarking a Semantic Web Service Architecture for Fault-tolerant B2B Integration
With the development and maturity of ServiceOriented Architectures (SOA) to support business-tobusiness transactions, organizations are implementing Web services to expose their p...
Jorge Cardoso
ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
15 years 11 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
ITCC
2005
IEEE
15 years 11 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis