Sciweavers

653 search results - page 125 / 131
» Database Privacy
Sort
View
NSPW
2003
ACM
14 years 3 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
FC
2000
Springer
127views Cryptology» more  FC 2000»
14 years 1 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
BIOID
2008
134views Biometrics» more  BIOID 2008»
13 years 11 months ago
Advanced Studies on Reproducibility of Biometric Hashes
The determination of hashes based on biometric data is a recent topic in biometrics as it allows to handle biometric templates in a privacy manner. Applications could be the genera...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 11 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
ISCI
2007
99views more  ISCI 2007»
13 years 9 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong