Sciweavers

1335 search results - page 215 / 267
» Privacy in Database Publishing
Sort
View
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
15 years 8 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
DEXAW
2006
IEEE
129views Database» more  DEXAW 2006»
15 years 8 months ago
Interaction Styles for Service Discovery in Mobile Business Applications
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a ...
Markus Aleksy, Colin Atkinson, Philipp Bostan, Tho...
FC
2005
Springer
157views Cryptology» more  FC 2005»
15 years 7 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 7 months ago
Electronic Voting Systems: Security Implications of the Administrative Workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focu...
Costas Lambrinoudakis, Spyros Kokolakis, Maria Kar...
DEXAW
1999
IEEE
105views Database» more  DEXAW 1999»
15 years 6 months ago
Personalizing the Web Using Site Descriptions
The information overload on the Web has created a great need for efficient filtering mechanisms. Many sites (e.g., CNN and Quicken) address this problem by allowing a user to crea...
Vinod Anupam, Yuri Breitbart, Juliana Freire, Bhar...