Sciweavers

1335 search results - page 112 / 267
» Privacy in Database Publishing
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
15 years 8 months ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion
CIKM
2008
Springer
15 years 6 months ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
NDSS
2009
IEEE
15 years 10 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
EDBT
2008
ACM
112views Database» more  EDBT 2008»
16 years 4 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng