Sciweavers

2272 search results - page 292 / 455
» Provable Data Privacy
Sort
View
96
Voted
ACSAC
2001
IEEE
15 years 6 months ago
Enabling Hierarchical and Bulk-Distribution for Watermarked Content
One of the solutions to deter copyright violations consists of embedding hard to detect watermarks in digital media. Current developments have focused on how to embed watermarks, ...
Germano Caronni, Christoph L. Schuba
CORR
2006
Springer
91views Education» more  CORR 2006»
15 years 2 months ago
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigati...
Katherine Luo, Yifan Li, Charis Ermopoulos, Willia...
ISI
2006
Springer
15 years 2 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
125
Voted
DMIN
2009
222views Data Mining» more  DMIN 2009»
15 years 11 days ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
SIGMOD
2001
ACM
124views Database» more  SIGMOD 2001»
16 years 2 months ago
Query Optimization In Compressed Database Systems
Over the last decades, improvements in CPU speed have outpaced improvements in main memory and disk access rates by orders of magnitude, enabling the use of data compression techn...
Zhiyuan Chen, Johannes Gehrke, Flip Korn