Sciweavers

1457 search results - page 71 / 292
» Privacy Challenges for Database Systems
Sort
View
100
Voted
ENVSOFT
2006
118views more  ENVSOFT 2006»
15 years 2 months ago
Database architectures: Current trends and their relationships to environmental data management
Ever increasing environmental demands from customers, authorities and governmental organizations as well as new business control functions are integrated to environmental manageme...
Jaroslav Pokorný
139
Voted
CCS
2011
ACM
14 years 2 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
102
Voted
EDBT
2009
ACM
128views Database» more  EDBT 2009»
15 years 6 months ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu
119
Voted
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 3 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
132
Voted
EDBT
2010
ACM
133views Database» more  EDBT 2010»
15 years 9 months ago
FPGAs: a new point in the database design space
In line with the insight that “one size” of databases will not fit all application needs [19], the database community is currently exploring various alternatives to commodity...
René Müller, Jens Teubner