Sciweavers

318 search results - page 35 / 64
» How to Leak a Secret
Sort
View
MDAI
2007
Springer
14 years 1 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
ICCS
2005
Springer
14 years 1 months ago
Hierarchical Infrastructure for Large-Scale Distributed Privacy-Preserving Data Mining
Abstract. Data Mining is often required to be performed among a number of groups of sites, where the precondition is that no privacy of any site should be leaked out to other sites...
Jinlong Wang, Congfu Xu, Huifeng Shen, Yunhe Pan
GRID
2004
Springer
14 years 28 days ago
A Web based Conversational Case-Based Recommender System for Ontology aided Metadata Discovery
Locating resources of interest in a large resourceintensive environment is a challenging problem. In this paper we present research on addressing this problem through the developm...
Mehmet S. Aktas, Marlon E. Pierce, Geoffrey Fox, D...
ICICS
2004
Springer
14 years 28 days ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
FLAIRS
2006
13 years 9 months ago
Focusing AI Students' Attention: A Framework-Based Approach to Guiding Impasse-Driven Learning
Research indicates that impasse-driven learning can have important benefits for improving student mastery of material. When students recognize gaps in their understanding of a con...
Steven Bogaerts, David B. Leake