Sciweavers

6907 search results - page 85 / 1382
» Securing distributed adaptation
Sort
View
ICDM
2007
IEEE
104views Data Mining» more  ICDM 2007»
15 years 4 months ago
Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical disclosure limitation (SDL) techniques a...
Aleksandra B. Slavkovic, Yuval Nardi, Matthew M. T...
EUROPKI
2004
Springer
15 years 3 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
NSDI
2008
15 years 5 days ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 10 months ago
Generalized Secure Distributed Source Coding with Side Information
In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...
ICNP
2006
IEEE
15 years 3 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui