Sciweavers

1335 search results - page 248 / 267
» Privacy in Database Publishing
Sort
View
ICDE
2010
IEEE
217views Database» more  ICDE 2010»
15 years 6 months ago
Toward industrial-strength keyword search systems over relational data
– Keyword search (KWS) over relational data, where the answers are multiple tuples connected via joins, has received significant attention in the past decade. Numerous solutions ...
Akanksha Baid, Ian Rae, AnHai Doan, Jeffrey F. Nau...
SACMAT
2009
ACM
15 years 6 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
CCR
2006
76views more  CCR 2006»
14 years 12 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
TITB
2008
204views more  TITB 2008»
14 years 11 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
PVLDB
2010
172views more  PVLDB 2010»
14 years 10 months ago
Secure Personal Data Servers: a Vision Paper
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on in...
Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yan...