Sciweavers

956 search results - page 22 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 2 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
ATC
2007
Springer
14 years 2 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 8 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
PAKDD
2004
ACM
131views Data Mining» more  PAKDD 2004»
14 years 1 months ago
Mining of Web-Page Visiting Patterns with Continuous-Time Markov Models
This paper presents a new prediction model for predicting when an online customer leaves a current page and which next Web page the customer will visit. The model can forecast the ...
Qiming Huang, Qiang Yang, Joshua Zhexue Huang, Mic...
ESORICS
2007
Springer
14 years 2 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther