Sciweavers

1510 search results - page 86 / 302
» Secure Distributed Data Aggregation
Sort
View
SOCIALCOM
2010
13 years 8 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
CCECE
2006
IEEE
14 years 4 months ago
A Survey of Secure B2C Commerce for Multicast Services
Services such as audio/video streaming, advertising, and software distribution can be delivered much more efficiently by Network Service Providers if multicast data distribution i...
Anil Kumar Venkataiahgari, J. William Atwood, Mour...
LISA
2008
14 years 12 days ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
ICALP
2005
Springer
14 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
TKDE
2010
151views more  TKDE 2010»
13 years 8 months ago
Duplicate-Insensitive Order Statistics Computation over Data Streams
—Duplicates in data streams may often be observed by the projection on a subspace and/or multiple recordings of objects. Without the uniqueness assumption on observed data elemen...
Ying Zhang, Xuemin Lin, Yidong Yuan, Masaru Kitsur...