Sciweavers

1906 search results - page 319 / 382
» Data Privacy
Sort
View
112
Voted
ICDE
2009
IEEE
124views Database» more  ICDE 2009»
15 years 9 months ago
An Architecture for Regulatory Compliant Database Management
— Spurred by financial scandals and privacy concerns, governments worldwide have moved to ensure confidence in digital records by regulating their retention and deletion. These...
Soumyadeb Mitra, Marianne Winslett, Richard T. Sno...
110
Voted
SAC
2009
ACM
15 years 9 months ago
Link-based event detection in email communication networks
People’s email communications can be modeled as graphs with vertices representing email accounts and edges representing email communications. Email communication data usually co...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
102
Voted
ISI
2004
Springer
15 years 8 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
SDMW
2004
Springer
15 years 8 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
130
Voted
SDM
2010
SIAM
183views Data Mining» more  SDM 2010»
15 years 4 months ago
GraSS: Graph Structure Summarization
Large graph databases are commonly collected and analyzed in numerous domains. For reasons related to either space efficiency or for privacy protection (e.g., in the case of socia...
Kristen LeFevre, Evimaria Terzi