Sciweavers

2272 search results - page 94 / 455
» Provable Data Privacy
Sort
View
ICDE
2006
IEEE
113views Database» more  ICDE 2006»
14 years 2 months ago
PRINDA: Architecture and Design of Non-Disclosure Agreements in Privacy Policy Framework
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider o...
Vikram Goyal, Shyam K. Gupta, Indira Meshram, Anan...
FUIN
2007
147views more  FUIN 2007»
13 years 8 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
SDM
2010
SIAM
151views Data Mining» more  SDM 2010»
13 years 9 months ago
Fast Stochastic Frank-Wolfe Algorithms for Nonlinear SVMs
The high computational cost of nonlinear support vector machines has limited their usability for large-scale problems. We propose two novel stochastic algorithms to tackle this pr...
Hua Ouyang, Alexander Gray
ICISC
2001
162views Cryptology» more  ICISC 2001»
13 years 9 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
PAISI
2010
Springer
13 years 6 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...