Sciweavers

2951 search results - page 384 / 591
» Secure Distributed DNS
Sort
View
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
16 years 5 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton
TACAS
2010
Springer
137views Algorithms» more  TACAS 2010»
15 years 11 months ago
Statistical Measurement of Information Leakage
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...
CLOUDCOM
2009
Springer
15 years 11 months ago
Accountability as a Way Forward for Privacy Protection in the Cloud
: The issue of how to provide appropriate privacy protection for cloud computing is important, and as yet unresolved. In this paper we propose an approach in which procedural and t...
Siani Pearson, Andrew Charlesworth
ICQNM
2008
IEEE
178views Chemistry» more  ICQNM 2008»
15 years 11 months ago
A Quantum Network Manager that Supports a One-Time Pad Stream
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one...
Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliv...
IPPS
2008
IEEE
15 years 11 months ago
Scalable dynamic information flow tracking and its applications
We are designing scalable dynamic information flow tracking techniques and employing them to carry out tasks related to debugging (bug location and fault avoidance), security (so...
Rajiv Gupta, Neelam Gupta, Xiangyu Zhang, Dennis J...