Sciweavers

187 search results - page 22 / 38
» PRIVATE-IYE: A Framework for Privacy Preserving Data Integra...
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
CASSIS
2005
Springer
14 years 2 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 8 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
JAMIA
2010
91views more  JAMIA 2010»
13 years 3 months ago
Serving the enterprise and beyond with informatics for integrating biology and the bedside (i2b2)
Informatics for Integrating Biology and the Bedside (i2b2) is one of seven projects sponsored by the NIH Roadmap National Centers for Biomedical Computing (http://www. ncbcs.org)....
Shawn N. Murphy, Griffin Weber, Michael Mendis, Vi...
JCDL
2011
ACM
260views Education» more  JCDL 2011»
12 years 11 months ago
Extending digital repository architectures to support disk image preservation and access
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support da...
Kam Woods, Christopher A. Lee, Simson Garfinkel