Sciweavers

181 search results - page 8 / 37
» Analyzing Regulatory Rules for Privacy and Security Requirem...
Sort
View
CCS
1998
ACM
13 years 11 months ago
A Security Architecture for Computational Grids
State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast computational resources. Both resources and data are ...
Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven...
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
14 years 1 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
ICASSP
2010
IEEE
13 years 7 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
JUCS
2008
149views more  JUCS 2008»
13 years 7 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
OOPSLA
2009
Springer
14 years 2 months ago
Supporting model evolution through demonstration-based model transformation
Model evolution is often supported by writing model transformation rules in specialized languages. This presents challenges to those who are unfamiliar with model transformation l...
Yu Sun