Sciweavers

1403 search results - page 137 / 281
» Security Model for XML Data
Sort
View
SDM
2004
SIAM
242views Data Mining» more  SDM 2004»
13 years 11 months ago
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analy...
Wenliang Du, Yunghsiang S. Han, Shigang Chen
VISUALIZATION
2002
IEEE
14 years 3 months ago
A Model for the Visualization Exploration Process
The current state of the art in visualization research places a strong emphasis on different techniques to derive insight from disparate types of data. However, little work has in...
T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
14 years 11 months ago
InstantDB: Enforcing Timely Degradation of Sensitive Data
- People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy v...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 4 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 3 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich