找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Secure Data Management; 4th VLDB Workshop, S Willem Jonker,Milan Petković Conference proceedings 2007 Springer-Verlag Berlin Heidelberg 200

[复制链接]
楼主: Insularity
发表于 2025-3-27 01:01:06 | 显示全部楼层
Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databasesswers are intervals. Introduced for the first time is a security requirement function . for a query, to specify the maximum probability .(.) that the precise query answer is within any interval of size .. Developed are random disclosure algorithms that satisfy security requirement functions, and gua
发表于 2025-3-27 01:54:38 | 显示全部楼层
发表于 2025-3-27 09:00:14 | 显示全部楼层
发表于 2025-3-27 11:05:03 | 显示全部楼层
Generating Microdata with ,-Sensitive ,-Anonymity Propertyction is built around the .-anonymity property. Several shortcomings of the .-anonymity model have been fixed by new privacy models such as .-sensitive .-anonymity, .-diversity, ., .-anonymity, and .-closeness. In this paper we introduce the . algorithm for generating .-sensitive .-anonymous microda
发表于 2025-3-27 15:48:06 | 显示全部楼层
Preventing Privacy-Invasive Software Using Collaborative Reputation Systemsure. Most privacy-invasive software is positioned in a legal grey zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This paper proposes the use of a specialized reputation system to gather and share information regarding software behaviour between com
发表于 2025-3-27 20:15:10 | 显示全部楼层
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinementalthcare sector increasingly important. However, several recent reports in the public media and the research community about healthcare privacy [1,2] indicate that the use of privacy policies is not necessarily a strong indication of adequate privacy protection for the patient. These observations hi
发表于 2025-3-28 00:58:13 | 显示全部楼层
发表于 2025-3-28 04:54:21 | 显示全部楼层
发表于 2025-3-28 06:43:27 | 显示全部楼层
A Three-Dimensional Conceptual Framework for Database Privacy terms of three dimensions, depending on whose privacy is considered: i) respondent privacy (to avoid re-identification of patients or other individuals to whom the database records refer); ii) owner privacy (to ensure that the owner must not give away his dataset); and iii) user privacy (to preserv
发表于 2025-3-28 14:10:12 | 显示全部楼层
Novel RFID Authentication Schemes for Security Enhancement and System Efficiencysingly concernd by individuals and organizations. Recently several hash-based mutual authentication schemes have been proposed to resolve security-related problems. However, previous schemes either suffer from security loopholes or have system efficiency problem for identity match process. In this p
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-1 18:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表