Sciweavers

653 search results - page 88 / 131
» Database Privacy
Sort
View
132
Voted
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 9 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
107
Voted
IEEEARES
2008
IEEE
15 years 9 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
163
Voted
TRUSTBUS
2007
Springer
15 years 8 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
220
Voted
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 2 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
97
Voted
EDBTW
2010
Springer
15 years 9 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim