Sciweavers

5119 search results - page 998 / 1024
» Security Privacy
Sort
View
78
Voted
ICDE
2009
IEEE
124views Database» more  ICDE 2009»
15 years 4 months ago
An Architecture for Regulatory Compliant Database Management
— Spurred by financial scandals and privacy concerns, governments worldwide have moved to ensure confidence in digital records by regulating their retention and deletion. These...
Soumyadeb Mitra, Marianne Winslett, Richard T. Sno...
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 4 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
76
Voted
APLAS
2009
ACM
15 years 4 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
86
Voted
SIGIR
2009
ACM
15 years 4 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi