Sciweavers

186 search results - page 19 / 38
» Secure Association Rule Sharing
Sort
View
CCS
2006
ACM
13 years 11 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
JASIS
2008
76views more  JASIS 2008»
13 years 7 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza
ICTAI
2007
IEEE
14 years 1 months ago
Exploratory Quantitative Contrast Set Mining: A Discretization Approach
Contrast sets have been shown to be a useful tool for describing differences between groups. A contrast set is a set of association rules for which the antecedents describe distin...
Mondelle Simeon, Robert J. Hilderman
TKDE
2010
164views more  TKDE 2010»
13 years 5 months ago
Defeasible Contextual Reasoning with Arguments in Ambient Intelligence
Abstract—The imperfect nature of context in Ambient Intelligence environments and the special characteristics of the entities that possess and share the available context informa...
Antonis Bikakis, Grigoris Antoniou
BCSHCI
2009
13 years 5 months ago
Digital parenting: designing children's safety
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Jennifer A. Rode