Sciweavers

10670 search results - page 43 / 2134
» Required Information Release
Sort
View
KDD
2008
ACM
162views Data Mining» more  KDD 2008»
16 years 7 days ago
Composition attacks and auxiliary information in data privacy
Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary informatio...
Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanat...
NDSS
2007
IEEE
15 years 6 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
14 years 3 months ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan
MSR
2009
ACM
15 years 6 months ago
Does calling structure information improve the accuracy of fault prediction?
Previous studies have shown that software code attributes, such as lines of source code, and history information, such as the number of code changes and the number of faults in pr...
Yonghee Shin, Robert M. Bell, Thomas J. Ostrand, E...
JCS
2007
141views more  JCS 2007»
14 years 11 months ago
Compositional information flow security for concurrent programs
We present a general unwinding framework for the definition of information flow security properties of concurrent programs, described in a simple imperative language enriched wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi