Sciweavers

14824 search results - page 2480 / 2965
» Security - Introduction
Sort
View
255
Voted
VLDB
2006
ACM
172views Database» more  VLDB 2006»
16 years 4 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
VLDB
2007
ACM
161views Database» more  VLDB 2007»
16 years 4 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
16 years 4 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
16 years 4 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 4 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
« Prev « First page 2480 / 2965 Last » Next »