Sciweavers

1457 search results - page 116 / 292
» Privacy Challenges for Database Systems
Sort
View
149
Voted
CSE
2009
IEEE
15 years 10 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
123
Voted
DSN
2007
IEEE
15 years 10 months ago
Automatic Cookie Usage Setting with CookiePicker
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
108
Voted
CCS
2008
ACM
15 years 5 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
151
Voted
PODS
2004
ACM
147views Database» more  PODS 2004»
16 years 3 months ago
Flexible Time Management in Data Stream Systems
Continuous queries in a Data Stream Management System (DSMS) rely on time as a basis for windows on streams and for defining a consistent semantics for multiple streams and updata...
Utkarsh Srivastava, Jennifer Widom
120
Voted
DEBU
2007
141views more  DEBU 2007»
15 years 3 months ago
Issues in Building Practical Provenance Systems
The importance of maintaining provenance has been widely recognized, particularly with respect to highly-manipulated data. However, there are few deployed databases that provide p...
Adriane Chapman, H. V. Jagadish