Sciweavers

947 search results - page 100 / 190
» Information Security in Mobile Databases
Sort
View
146
Voted
EDBT
2010
ACM
181views Database» more  EDBT 2010»
15 years 2 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
139
Voted
JIT
2004
Springer
123views Database» more  JIT 2004»
15 years 9 months ago
Listening to Agents - Transparent Representation and Presentation of Agent Communication in Mobile Systems
In the research domain agent-based systems are widely used for mobile and distributed information systems. Their underlying paradigm provides excellent mechanisms to isolate tasks ...
Matthias Jöst, Matthias Merdes, Rainer Malaka
134
Voted
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 9 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon
117
Voted
WWW
2008
ACM
16 years 4 months ago
Improving personalized services in mobile commerce by a novel multicriteria rating approach
With the rapid growth of wireless technologies and mobile devices, there is a great demand for personalized services in mcommerce. Collaborative filtering (CF) is one of successfu...
Qiudan Li, Chunheng Wang, Guanggang Geng
135
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...