Sciweavers

97 search results - page 15 / 20
» Beyond Just Data Privacy
Sort
View
ECIR
2008
Springer
13 years 9 months ago
Workshop on Novel Methodologies for Evaluation in Information Retrieval
Information retrieval is an empirical science; the field cannot move forward unless there are means of evaluating the innovations devised by researchers. However the methodologies...
Mark Sanderson, Martin Braschler, Nicola Ferro, Ju...
IJMSO
2007
109views more  IJMSO 2007»
13 years 8 months ago
MOQ: Web services ontologies for QoS and general quality evaluations
When describing Web services, one of the obvious aspects that needs representing is Quality of Service” (QoS), the capability of a Web service to meet an acceptable level of ser...
Henry M. Kim, Arijit Sengupta, Joerg Evermann
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
13 years 12 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 9 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
NDSS
2007
IEEE
14 years 2 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith