Sciweavers

1335 search results - page 228 / 267
» Privacy in Database Publishing
Sort
View
CCS
2007
ACM
15 years 6 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
CCS
2004
ACM
15 years 5 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
ICDE
2011
IEEE
224views Database» more  ICDE 2011»
14 years 3 months ago
SmartTrace: Finding similar trajectories in smartphone networks without disclosing the traces
—In this demonstration paper, we present a powerful distributed framework for finding similar trajectories in a smartphone network, without disclosing the traces of participatin...
Costandinos Costa, Christos Laoudias, Demetrios Ze...
ACISP
1997
Springer
15 years 4 months ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz