Sciweavers

GLOBECOM
2010
IEEE
13 years 8 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
IEEESP
2010
126views more  IEEESP 2010»
13 years 9 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
ISI
2006
Springer
13 years 11 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ICDE
2010
IEEE
241views Database» more  ICDE 2010»
13 years 11 months ago
Privometer: Privacy protection in social networks
— The increasing popularity of social networks, such as Facebook and Orkut, has raised several privacy concerns. Traditional ways of safeguarding privacy of personal information ...
Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmag...
CIKM
2008
Springer
14 years 1 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
ACSAC
2006
IEEE
14 years 2 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
14 years 3 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
PODS
2000
ACM
112views Database» more  PODS 2000»
14 years 3 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
14 years 4 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba
CCS
2004
ACM
14 years 4 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon