Sciweavers

881 search results - page 11 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 7 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SOUPS
2009
ACM
14 years 2 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
EUROSYS
2008
ACM
14 years 4 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
WECWIS
2002
IEEE
131views ECommerce» more  WECWIS 2002»
14 years 14 days ago
Mining Client-Side Activity for Personalization
“Garbage in. garbage out” is a well-known phrase in computer analysis, and one that comes to mind when mining Web data to draw conclusions about Web users. The challenge is th...
Kurt D. Fenstermacher, Mark Ginsburg
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
13 years 11 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani