Sciweavers

2257 search results - page 30 / 452
» Secure program partitioning
Sort
View
CIKM
2008
Springer
13 years 10 months ago
Privacy-preserving data publishing for horizontally partitioned databases
There is an increasing need for sharing data repositories containing personal information across multiple distributed, possibly untrusted, and private databases. Such data sharing...
Pawel Jurczyk, Li Xiong
BROADNETS
2006
IEEE
14 years 2 months ago
Design and Dimensioning of a Novel composite-star WDM Network with TDM Channel Partitioning
— This paper presents the design and dimensioning optimization of a novel optical network structure, called the Petaweb, having a total capacity of several Pb/s (1015 bit/s). Its...
Stefano Secci, Brunilde Sansò
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
14 years 9 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
14 years 3 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
TC
2008
13 years 8 months ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...