Sciweavers

1335 search results - page 202 / 267
» Privacy in Database Publishing
Sort
View
DAWAK
2006
Springer
15 years 8 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
ACSAC
2001
IEEE
15 years 8 months ago
A Framework for Multiple Authorization Types in a Healthcare Application System
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
Ramaswamy Chandramouli
ACSAC
2001
IEEE
15 years 8 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
BIOSURVEILLANCE
2008
Springer
15 years 6 months ago
Integrating a Commuting Model with the Bayesian Aerosol Release Detector
The Bayesian Aerosol Release Detector (BARD) is a biosurveillance system for detecting and characterizing disease outbreaks caused by aerosol releases of anthrax. A major challenge...
Aurel Cami, Garrick L. Wallstrom, William R. Hogan
ECIS
2003
15 years 6 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther