Sciweavers

3452 search results - page 100 / 691
» Secure Data Outsourcing
Sort
View
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 10 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
ANCS
2008
ACM
14 years 1 days ago
Data path credentials for high-performance capabilities-based networks
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any d...
Tilman Wolf
JNCA
2006
86views more  JNCA 2006»
13 years 10 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 9 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
NCA
2011
IEEE
13 years 5 months ago
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data
—Neural Networks have been an active research area for decades. However, privacy bothers many when the training dataset for the neural networks is distributed between two parties...
Ankur Bansal, Tingting Chen, Sheng Zhong