Sciweavers

733 search results - page 4 / 147
» Private inference control
Sort
View
ICDT
2007
ACM
148views Database» more  ICDT 2007»
14 years 1 months ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
14 years 9 months ago
On the Controlled Evolution of Process Choreographies
Process?aware information systems have to be frequently adapted due to business process changes. One important challenge not adequately addressed so far concerns the evolution of ...
Stefanie Rinderle, Andreas Wombacher, Manfred Reic...
WWW
2009
ACM
14 years 8 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor
ICWS
2007
IEEE
13 years 9 months ago
Service-Oriented Virtual Private Networks for Grid Applications
Emerging Grid applications desire not only high bandwidth but also the ability to control the topology and traffic engineering of the underlying networks, through web service inte...
Hanxi Zhang, Michel Savoie, Scott Campbell, Sergi ...
CSREASAM
2004
13 years 9 months ago
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...