Sciweavers

1779 search results - page 160 / 356
» A Formal Model of Data Privacy
Sort
View
117
Voted
OOPSLA
2010
Springer
15 years 3 months ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
PROVSEC
2010
Springer
15 years 2 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
112
Voted
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 4 months ago
Anonymity for continuous data publishing
k-anonymization is an important privacy protection mechanism in data publishing. While there has been a great deal of work in recent years, almost all considered a single static r...
Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jia...
134
Voted
DAWAK
2007
Springer
15 years 10 months ago
Automating the Schema Matching Process for Heterogeneous Data Warehouses
Abstract. A federated data warehouse is a logical integration of data warehouses applicable when physical integration is impossible due to privacy policy or legal restrictions. In ...
Marko Banek, Boris Vrdoljak, A. Min Tjoa, Zoran Sk...
136
Voted
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 8 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...