Sciweavers

3452 search results - page 30 / 691
» Secure Data Outsourcing
Sort
View
PET
2012
Springer
11 years 11 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
IEEEARES
2007
IEEE
14 years 2 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath
ICDE
2004
IEEE
99views Database» more  ICDE 2004»
14 years 10 months ago
Proving Ownership over Categorical Data
This paper introduces a novel method of rights protection for categorical data through watermarking. We discover new watermark embedding channels for relational data with categori...
Radu Sion
WWW
2007
ACM
14 years 9 months ago
Internet-scale collection of human-reviewed data
Enterprise and web data processing and content aggregation systems often require extensive use of human-reviewed data (e.g. for training and monitoring machine learning-based appl...
Qi Su, Dmitry Pavlov, Jyh-Herng Chow, Wendell C. B...
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 10 months ago
Randomized Synopses for Query Assurance on Data Streams
The overwhelming flow of information in many data stream applications forces many companies to outsource to a third-party the deployment of a Data Stream Management System (DSMS) f...
Ke Yi, Feifei Li, Marios Hadjieleftheriou, George ...