Sciweavers

5255 search results - page 160 / 1051
» Formal Methods for Privacy
Sort
View
132
Voted
ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
15 years 9 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
MANSCI
2006
94views more  MANSCI 2006»
15 years 3 months ago
Design of Robust Business-to-Business Electronic Marketplaces with Guaranteed Privacy
Most successful online marketplaces today are owned and operated by firms that are themselves traders in the marketplace. This raises significant concerns about the fairness of th...
Joakim Kalvenes, Amit Basu
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 3 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
221
Voted
IJISEC
2007
66views more  IJISEC 2007»
15 years 3 months ago
Protecting data privacy through hard-to-reverse negative databases
The paper extends the idea of negative representations of information for enhancing privacy. Simply put, a set DB of data elements can be represented in terms of its complement set...
Fernando Esponda, Elena S. Ackley, Paul Helman, Ha...
136
Voted
EDCC
2005
Springer
15 years 9 months ago
Formal Safety Analysis of a Radio-Based Railroad Crossing Using Deductive Cause-Consequence Analysis (DCCA)
Abstract. In this paper we present the formal safety analysis of a radiobased railroad crossing. We use deductive cause-consequence analysis (DCCA) as analysis method. DCCA is a no...
Frank Ortmeier, Wolfgang Reif, Gerhard Schellhorn