Sciweavers

947 search results - page 139 / 190
» Information Security in Mobile Databases
Sort
View
BMCBI
2008
111views more  BMCBI 2008»
13 years 11 months ago
VisualRepbase: an interface for the study of occurrences of transposable element families
Background: Repbase is a reference database of eukaryotic repetitive DNA, which includes prototypic sequences of repeats and basic information described in annotations. Repbase al...
Sébastien Tempel, Matthew Jurka, Jerzy Jurk...
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 5 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
SP
2008
IEEE
14 years 5 months ago
Robust De-anonymization of Large Sparse Datasets
We present a new class of statistical deanonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. ...
Arvind Narayanan, Vitaly Shmatikov
OOPSLA
1992
Springer
14 years 3 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
BIOSIG
2008
105views Biometrics» more  BIOSIG 2008»
14 years 13 days ago
A Novel Privacy Enhancing Algorithm for Biometric System
: Biometrics provide the possibility of unique and convenient authentication. As its application areas grow rapidly, the problems, such as identity fraud and cross matching, threat...
Xuebing Zhou, Christoph Busch