Sciweavers

6431 search results - page 1190 / 1287
» Model Building by Resolution
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 3 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
POPL
2008
ACM
16 years 3 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 3 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
SIGMOD
2001
ACM
134views Database» more  SIGMOD 2001»
16 years 3 months ago
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives
Digital archives are dedicated to the long-term preservation of electronic information and have the mandate to enable sustained access despite rapid technology changes. Persistent...
Bertram Ludäscher, Richard Marciano, Reagan Moore
PODS
2003
ACM
156views Database» more  PODS 2003»
16 years 3 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
« Prev « First page 1190 / 1287 Last » Next »