Sciweavers

615 search results - page 97 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
DOLAP
2004
ACM
14 years 2 months ago
Cardinality-based inference control in OLAP systems: an information theoretic approach
We address the inference control problem in data cubes with some data known to users through external knowledge. The goal of inference controls is to prevent exact values of sensi...
Nan Zhang 0004, Wei Zhao, Jianer Chen
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 2 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
MIDDLEWARE
2004
Springer
14 years 2 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
AGENTS
2000
Springer
14 years 1 months ago
Agent communication transfer protocol
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
Alexander Artikis, Jeremy Pitt, Christos Stergiou