Sciweavers

252 search results - page 32 / 51
» The Protection Of Public Health Data - A Case Study
Sort
View
PODS
2000
ACM
112views Database» more  PODS 2000»
14 years 1 days ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
AICT
2006
IEEE
14 years 1 months ago
Web Services Roadmap: The Semantic Web Perspective
Recently the field of Web services has gained focus both in industry and academia. While industry has been mostly interested in standardisation and promotion of the technology, a...
Peep Küngas, Mihhail Matskin
AISM
2004
13 years 9 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
SOUPS
2005
ACM
14 years 1 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu