Sciweavers

770 search results - page 111 / 154
» Privacy Preserving Joins
Sort
View
CSFW
2007
IEEE
15 years 6 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
DAWAK
2006
Springer
15 years 3 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
ACSAC
2010
IEEE
14 years 10 months ago
Forenscope: a framework for live forensics
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
STOC
2009
ACM
112views Algorithms» more  STOC 2009»
16 years 13 days ago
A new approach to auctions and resilient mechanism design
We put forward a new approach to mechanism design, and exemplify it via a new mechanism guaranteeing significant revenue in unrestricted combinatorial auctions. Our mechanism ? su...
Jing Chen, Silvio Micali
ER
2004
Springer
103views Database» more  ER 2004»
15 years 5 months ago
WebDG - A Platform for E-Government Web Services
Abstract. Web services are deemed as the natural choice for deploying e-government applications. Their use enables e-government to fully get advantage of the envisioned Semantic We...
Athman Bouguettaya, Brahim Medjahed, Abdelmounaam ...