Sciweavers

120 search results - page 15 / 24
» Threats to privacy in the forensic analysis of database syst...
Sort
View
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 2 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
CCS
2006
ACM
13 years 11 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
ISI
2003
Springer
14 years 27 days ago
Database Support for Exploring Criminal Networks
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
M. N. Smith, Peter J. H. King
DNIS
2007
Springer
93views Database» more  DNIS 2007»
13 years 9 months ago
Location Privacy in Geospatial Decision-Making
Geospatial data-sets are becoming commonplace in many application domains, especially in the area of decision-making. Current state-of-the-art in geospatial systems either lack the...
Cyrus Shahabi, Ali Khoshgozaran
JIDM
2010
122views more  JIDM 2010»
13 years 6 months ago
Revisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering w...
Stanley R. M. Oliveira, Osmar R. Zaïane