Sciweavers

651 search results - page 20 / 131
» Negative Database for Data Security
Sort
View
DEBU
2007
131views more  DEBU 2007»
13 years 7 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
ICDE
1996
IEEE
124views Database» more  ICDE 1996»
14 years 9 months ago
Automating the Assembly of Presentations from Multimedia Databases
A multimedia presentation refers to the presentation of multimedia data using output devices such as monitors for text and video, and speakers for audio. Each presentation consist...
Gultekin Özsoyoglu, Joel Kraft, Veli Hakkoyma...
VLDB
2006
ACM
122views Database» more  VLDB 2006»
14 years 8 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
ISI
2003
Springer
14 years 28 days ago
Database Support for Exploring Criminal Networks
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
M. N. Smith, Peter J. H. King
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
14 years 8 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton