chapel 发表于 2025-3-25 05:43:59

Privacy Protocol for Linking Distributed Medical Data such personal data within a distributed system. Privacy-preserving . provide mechanisms for implementing and maintaining these privacy constraints. In this paper, we introduce a new two-phase protocol for protecting the privacy of patients. The first phase implements a private record linking. There

赤字 发表于 2025-3-25 10:47:27

Cloud and the City: Facilitating Flexible Access Control over Data-Streamsarious real-time applications and services as well as long-term planning, e.g., in the context of intelligent cities or smart homes. A mature cloud infrastructure brings such a vision closer to reality than ever before, as more and more data owners are moving their data to the cloud. Hence, the abil

mitral-valve 发表于 2025-3-25 13:39:27

http://reply.papertrans.cn/87/8633/863275/863275_23.png

inveigh 发表于 2025-3-25 18:21:51

http://reply.papertrans.cn/87/8633/863275/863275_24.png

thwart 发表于 2025-3-25 22:09:58

http://reply.papertrans.cn/87/8633/863275/863275_25.png

Override 发表于 2025-3-26 03:18:15

http://reply.papertrans.cn/87/8633/863275/863275_26.png

Prologue 发表于 2025-3-26 06:46:55

Provenance for Web 2.0 Dataa piece of Web data carries along different facets, such the . that data underwent, the different . that users have on the content, and the . in which a statement is made. We put forward the idea that ., i.e. the tracing of where data comes from, can help us model these phenomena. We study how far e

KIN 发表于 2025-3-26 09:14:57

Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agenciesensic cloud data center environment. The basic idea of the approach is to view the interaction process of collaborating forensic cloud data centers overseeing an existing investigation or a set of such investigations across distinct jurisdictions. This work is an important first step to support the

神圣不可 发表于 2025-3-26 12:56:59

Towards Trustworthy Health Platform Cloudan approach to build a trustworthy healthcare platform cloud, based on a trustworthy cloud infrastructure. This paper first highlights the main security and privacy risks of market available commodity clouds, and outlines security and privacy requirements of a trustworthy health platform cloud, on t

Affectation 发表于 2025-3-26 17:33:06

Conference proceedings 20122 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Secure Data Management; 9th VLDB Workshop, S Willem Jonker,Milan Petković Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 201