Sciweavers

1335 search results - page 101 / 267
» Privacy in Database Publishing
Sort
View
CRYPTO
2007
Springer
172views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Deterministic and Efficiently Searchable Encryption
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We ob...
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
COMPSAC
2004
IEEE
15 years 7 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
COMPSAC
2005
IEEE
15 years 5 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
199
Voted
ICDE
2005
IEEE
119views Database» more  ICDE 2005»
16 years 5 months ago
Batched Processing for Information Filters
This paper describes batching, a novel technique in order to improve the throughput of an information filter (e.g. message broker or publish & subscribe system). Rather than p...
Peter M. Fischer, Donald Kossmann
ICDT
2007
ACM
120views Database» more  ICDT 2007»
15 years 10 months ago
Scalable Query Dissemination in XPeer
Abstract. This paper presents XPeer, a data sharing system for massively distributed XML data. XPeer allows users to publish and query heterogeneous information without any signiï¬...
Giovanni Conforti, Giorgio Ghelli, Paolo Manghi, C...