Sciweavers

187 search results - page 17 / 38
» PRIVATE-IYE: A Framework for Privacy Preserving Data Integra...
Sort
View
104
Voted
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
16 years 2 days ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
87
Voted
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 2 days ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
88
Voted
ICPR
2004
IEEE
16 years 23 days ago
An Integrated Decoding Framework for Audio Watermark Extraction
This paper proposes a blind audio watermark extraction technique that allows performing watermark decoding while installing data synchronization. The proposed decoding algorithm e...
Bilge Günsel, Yusuf Yaslan
209
Voted
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
16 years 1 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
90
Voted
ACSAC
2007
IEEE
15 years 6 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...