Sciweavers

146 search results - page 16 / 30
» How to Make Replicated Data Secure
Sort
View
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 8 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
CSFW
2002
IEEE
14 years 15 days ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
BMCBI
2007
168views more  BMCBI 2007»
13 years 7 months ago
Bayesian model-based inference of transcription factor activity
Background: In many approaches to the inference and modeling of regulatory interactions using microarray data, the expression of the gene coding for the transcription factor is co...
Simon Rogers, Raya Khanin, Mark Girolami
ACSAC
2000
IEEE
13 years 11 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...