Sciweavers

712 search results - page 114 / 143
» Secure Data Management in Trusted Computing
Sort
View
SAC
2005
ACM
14 years 2 months ago
SVD-based collaborative filtering with privacy
Collaborative ļ¬ltering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
AIMS
2008
Springer
14 years 3 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a ļ¬‚at data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
13 years 2 days ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
CCS
2010
ACM
13 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
COOPIS
1998
IEEE
14 years 1 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel