Sciweavers

331 search results - page 33 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
155
Voted
FAST
2007
15 years 4 months ago
Data ONTAP GX: A Scalable Storage Cluster
Data ONTAP GX is a clustered Network Attached File server composed of a number of cooperating filers. Each filer manages its own local file system, which consists of a number of d...
Michael Eisler, Peter Corbett, Michael Kazar, Dani...
154
Voted
WETICE
2006
IEEE
15 years 8 months ago
A Hybrid P2P Protocol for Real-Time Collaboration
Peer-to-Peer architecture is currently an attractive solution for facilitating the use of collaboration software without any server. Multicasting is usually proposed for group com...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
132
Voted
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 9 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
CAISE
2000
Springer
15 years 6 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
15 years 6 months ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang