Sciweavers

1398 search results - page 189 / 280
» Medical Database Security
Sort
View
110
Voted
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 23 days ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
98
Voted
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 6 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
95
Voted
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 5 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
SIGMOD
1999
ACM
107views Database» more  SIGMOD 1999»
15 years 5 months ago
Client-Site Query Extensions
We explore the execution of queries with client-site userdefined functions (UDFs). Many UDFs can only be executed at the client site, for reasons of scalability, security, confide...
Tobias Mayr, Praveen Seshadri
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 7 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....