Sciweavers

1335 search results - page 145 / 267
» Privacy in Database Publishing
Sort
View
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
15 years 2 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
CCS
2011
ACM
14 years 4 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ESORICS
2004
Springer
15 years 9 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
ELPUB
2008
ACM
15 years 6 months ago
Global annual volume of peer reviewed scholarly articles and the share available via different Open Access options
A key parameter in any discussions about the academic peer reviewed journal system is the number of articles annually published. Several diverging estimates of this parameter have...
Bo-Christer Björk, Annikki Roos, Mari Lauri
PODS
2004
ACM
130views Database» more  PODS 2004»
16 years 4 months ago
Computational Complexity of Itemset Frequency Satisfiability
Computing frequent itemsets is one of the most prominent problems in data mining. We introduce a new, related problem, called FREQSAT: given some itemset-interval pairs, does ther...
Toon Calders