Sciweavers

56 search results - page 10 / 12
» ieeeares 2008
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
IEEEARES
2008
IEEE
15 years 4 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
IEEEARES
2008
IEEE
15 years 4 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
IEEEARES
2008
IEEE
15 years 4 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
IEEEARES
2008
IEEE
15 years 4 months ago
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy...
Esma Aïmeur, Gilles Brassard, José Man...