Sciweavers

3452 search results - page 37 / 691
» Secure Data Outsourcing
Sort
View
CCGRID
2008
IEEE
14 years 3 months ago
A Performance Study of Secure Data Mining on the Cell Processor
— This paper examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the p...
Hong Wang 0006, Hiroyuki Takizawa, Hiroaki Kobayas...
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
14 years 3 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
ISI
2007
Springer
13 years 8 months ago
Privacy Preserving Collaborative Data Mining
Privacy-preserving data mining is an important issue in the areas of data mining and security. In this paper, we study how to conduct association rule mining, one of the core data...
Justin Z. Zhan
DBSEC
2003
140views Database» more  DBSEC 2003»
13 years 10 months ago
Correlated Data Inference
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Csilla Farkas, Andrei Stoica
IJBC
2008
50views more  IJBC 2008»
13 years 8 months ago
Secure Data Transmission Based on Multi-Input Multi-Output Delayed Chaotic System
This paper deals with the problem of secure data transmission based on multi-input multi-output delayed chaotic systems. A new multi-input secure data transmission scheme is propo...
Gang Zheng, Driss Boutat, Thierry Floquet, Jean-Pi...