Sciweavers

656 search results - page 90 / 132
» Noiseless Database Privacy
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
ACSAC
2007
IEEE
14 years 4 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
PODS
2004
ACM
109views Database» more  PODS 2004»
14 years 10 months ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams
EDBT
2008
ACM
131views Database» more  EDBT 2008»
14 years 10 months ago
A Bayesian approach for on-line max and min auditing
In this paper we consider the on-line max and min query auditing problem: given a private association between fields in a data set, a sequence of max and min queries that have alr...
Gerardo Canfora, Bice Cavallo
ISI
2004
Springer
14 years 3 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia