Sciweavers

1335 search results - page 68 / 267
» Privacy in Database Publishing
Sort
View
108
Voted
ICDM
2006
IEEE
169views Data Mining» more  ICDM 2006»
15 years 9 months ago
Privacy-Preserving Data Imputation
In this paper, we investigate privacy-preserving data imputation on distributed databases. We present a privacypreserving protocol for filling in missing values using a lazy deci...
Geetha Jagannathan, Rebecca N. Wright
158
Voted
PET
2004
Springer
15 years 9 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
144
Voted
BNCOD
2009
228views Database» more  BNCOD 2009»
15 years 4 months ago
A Data Privacy Taxonomy
Abstract. Privacy has become increasingly important to the database community which is reflected by a noteworthy increase in research papers appearing in the literature. While rese...
Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz G...
110
Voted
SP
2009
IEEE
15 years 10 months ago
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
We defeat two proposed Unix file-system race condition defense mechanisms. First, we attack the probabilistic defense mechanism of Tsafrir, et al., published at USENIX FAST 2008[...
Xiang Cai, Yuwei Gui, Rob Johnson
124
Voted
PAISI
2007
Springer
15 years 9 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee