Sciweavers

108 search results - page 13 / 22
» Direct anonymous attestation
Sort
View
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
13 years 8 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
HICSS
2008
IEEE
133views Biometrics» more  HICSS 2008»
14 years 3 months ago
A Study of the Causal Relationship between IT Governance Inhibitors and Its Success in Korea Enterprises
In recent years, the emergence of the term IT Governance (ITG) has pointed to the increasing importance for business of effecting an alignment between its strategic direction and ...
Chi-Hoon Lee, Jung-Hoon Lee, Jong-Sung Park, Kap-Y...
EUROPKI
2005
Springer
14 years 2 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl
IM
2003
13 years 10 months ago
Khnum - A Scalable Rapid Application Deployment System for Dynamic Hosting Infrastructures
: In a dynamically scalable hosting infrastructure for e-business computing, servers need to be quickly allocated in order to satisfy a sudden demand for increased computing power ...
Alain Azagury, Germán S. Goldszmidt, Yair K...
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
14 years 9 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li