Sciweavers

1457 search results - page 81 / 292
» Privacy Challenges for Database Systems
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 3 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
141
Voted
SAC
2005
ACM
15 years 9 months ago
A complex biological database querying method
Many biological information systems rely on relational database management systems (RDBMS) to manage high-throughput biological data. While keeping these data well archived, organ...
Jake Yue Chen, John V. Carlis, Ning Gao
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
16 years 4 months ago
InstantDB: Enforcing Timely Degradation of Sensitive Data
- People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy v...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
139
Voted
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
16 years 3 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 7 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...