Sciweavers

1457 search results - page 39 / 292
» Privacy Challenges for Database Systems
Sort
View
ICDE
2009
IEEE
149views Database» more  ICDE 2009»
15 years 11 days ago
OPAQUE: Protecting Path Privacy in Directions Search
Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus r...
Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baih...
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 11 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
SEMCO
2007
IEEE
14 years 5 months ago
Challenges and Directions for Semantic Communication
— This paper aims to present ideas to bridge the gap between two conflicting views of information: Shannon information, which is used to model physical layer information, and se...
Volkan Rodoplu, Snehal S. Vadvalkar
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 4 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
DAMON
2006
Springer
14 years 2 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...