Sciweavers

242 search results - page 12 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
GIS
2009
ACM
15 years 4 months ago
An agenda for the next generation gazetteer: geographic information contribution and retrieval
Gazetteers are key components of georeferenced information systems, including applications such as Web-based mapping services. Existing gazetteers lack the capabilities to fully i...
Carsten Keßler, Krzysztof Janowicz, Mohamed ...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 12 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
PLDI
2011
ACM
14 years 8 days ago
Caisson: a hardware description language for secure information flow
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s roo...
Xun Li 0001, Mohit Tiwari, Jason Oberg, Vineeth Ka...
ERSA
2006
102views Hardware» more  ERSA 2006»
14 years 10 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
EDBT
2012
ACM
225views Database» more  EDBT 2012»
12 years 12 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu