Sciweavers

165 search results - page 5 / 33
» Composition attacks and auxiliary information in data privac...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
ICDE
2005
IEEE
167views Database» more  ICDE 2005»
14 years 9 months ago
Privacy and Ownership Preserving of Outsourced Medical Data
The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing o...
Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Rober...
INFOCOM
2011
IEEE
12 years 11 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
ICASSP
2008
IEEE
14 years 2 months ago
Dynamic signature verification with template protection using helper data
A biometric template protection system for dynamic signature veri cation is presented. The approach uses auxiliary (helper) data that allows the matching with secure templates but...
Manuel R. Freire, Julian Fiérrez, Javier Or...
CSFW
1992
IEEE
13 years 11 months ago
Causal Security
This paper gives a new definition of Security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent...
Miranda Mowbray