-
1
-
-
84937704689
-
-
J. Plansky, J. Solomon, R. Karp, and C. Drisko. The Data Gold Rush, Strategy Report 2013. http://www.strategyand.pwc.com/media/file/Strategyand-The-Data-Gold-Rush.pdf, 2013.
-
(2013)
The Data Gold Rush, Strategy Report 2013
-
-
Plansky, J.1
Solomon, J.2
Karp, R.3
Drisko, C.4
-
2
-
-
0031988304
-
The impact of poor data quality on the typical enterprise
-
Thomas C Redman. The impact of poor data quality on the typical enterprise. Communications of the ACM, 41(2), 1998.
-
(1998)
Communications of the ACM
, vol.41
, Issue.2
-
-
Redman, T.C.1
-
3
-
-
0036036947
-
Data integration: A theoretical perspective
-
Maurizio Lenzerini. Data integration: A theoretical perspective. In PODS, 2002.
-
(2002)
PODS
-
-
Lenzerini, M.1
-
5
-
-
0036885487
-
AIMQ: A methodology for information quality assessment
-
Yang W, Lee, Diane ., M Strong, Beverly K Kahn, and Richard YWang. AIMQ: A methodology for information quality assessment. Information & management, 40(2), 2002.
-
(2002)
Information & Management
, vol.40
, Issue.2
-
-
Yang, W.1
Lee, D.2
Strong, M.3
Kahn, B.K.4
Ywang, R.5
-
7
-
-
0032640897
-
Consistent query answers in inconsistent databases
-
Marcelo Arenas, Leopoldo Bertossi, and Jan Chomicki. Consistent query answers in inconsistent databases. In PODS, 1999.
-
(1999)
PODS
-
-
Arenas, M.1
Bertossi, L.2
Chomicki, J.3
-
8
-
-
84882696854
-
The llunatic data-cleaning framework
-
Floris Geerts, Giansalvatore Mecca, Paolo Papotti, and Donatello Santoro. The llunatic data-cleaning framework. VLDB Endowment, 6(9), 2013.
-
(2013)
VLDB Endowment
, vol.6
, Issue.9
-
-
Geerts, F.1
Mecca, G.2
Papotti, P.3
Santoro, D.4
-
9
-
-
57549084481
-
Dependencies revisited for improving data quality
-
Wenfei Fan. Dependencies revisited for improving data quality. In PODS, 2008.
-
(2008)
PODS
-
-
Fan, W.1
-
10
-
-
84959912087
-
Improving data quality: Consistency and accuracy
-
Gao Cong, Wenfei Fan, Floris Geerts, Xibei Jia, and Shuai Ma. Improving data quality: Consistency and accuracy. In VLDB, 2007.
-
(2007)
VLDB
-
-
Cong, G.1
Fan, W.2
Geerts, F.3
Jia, X.4
Ma, S.5
-
11
-
-
84882979330
-
Health insurance portability and accountability act of 1996
-
An Act
-
An Act. Health insurance portability and accountability act of 1996. Public Law, 104:191, 1996.
-
(1996)
Public Law
, vol.104
, pp. 191
-
-
-
12
-
-
77953306876
-
Predictive blacklisting as an implicit recommendation system
-
Fabio Soldo, Anh Le, and Athina Markopoulou. Predictive blacklisting as an implicit recommendation system. In INFOCOM, 2010.
-
(2010)
INFOCOM
-
-
Soldo, F.1
Le, A.2
Markopoulou, A.3
-
13
-
-
79960561313
-
-
Collaborating against common enemies
-
Sachin Katti, Balachander Krishnamurthy, and Dina Katabi. Collaborating against common enemies. In IMC, 2005.
-
(2005)
IMC
-
-
Katti, S.1
Krishnamurthy, B.2
Katabi, D.3
-
16
-
-
84937678810
-
-
Brent Tzion Hailpern, Peter Kenneth Malkin, Robert Jeffrey Schloss, Steve R White, Philip Shi-Lung Yu, and Charles Campbell Palmer. Collaborative server processing of content and meta-information with application to virus checking in a server network, 2001. US Patent 6, 275, 937.
-
(2001)
Collaborative Server Processing of Content and Meta-information with Application to Virus Checking in a Server Network
-
-
Hailpern, B.T.1
Malkin, P.K.2
Schloss, R.J.3
White, S.R.4
Yu, P.S.-L.5
Palmer, C.C.6
-
17
-
-
84937675712
-
Large-scale collection and sanitization of network security data: Risks and challenges
-
Phillip Porras and Vitaly Shmatikov. Large-scale collection and sanitization of network security data: Risks and challenges. In Workshop on New security paradigms, 2006.
-
(2006)
Workshop on New Security Paradigms
-
-
Porras, P.1
Shmatikov, V.2
-
19
-
-
84890348565
-
Collaborative, privacy-preserving data aggregation at scale
-
B. Applebaum, H. Ringberg, M.J. Freedman, M. Caesar, and J. Rexford. Collaborative, privacy-preserving data aggregation at scale. In PETS, 2010.
-
(2010)
PETS
-
-
Applebaum, B.1
Ringberg, H.2
Freedman, M.J.3
Caesar, M.4
Rexford, J.5
-
20
-
-
85084159849
-
Privacypreserving sharing and correction of security alerts
-
Patrick Lincoln, Phillip Porras, and Vitally Shmatikov. Privacypreserving sharing and correction of security alerts. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Lincoln, P.1
Porras, P.2
Shmatikov, V.3
-
21
-
-
84863447066
-
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
-
Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In Usenix Security, 2010.
-
(2010)
Usenix Security
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
23
-
-
0010064835
-
DoD guidelines on data quality management
-
Phillip Cykana, Alta Paul, and Miranda Stern. DoD Guidelines on Data Quality Management. In IQ, pages 154-171, 1996.
-
(1996)
IQ
, pp. 154-171
-
-
Cykana, P.1
Paul, A.2
Stern, M.3
-
24
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Paillier, P.1
-
25
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
I. Damgård and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Workshop on Practice and Theory in Public Key Cryptosystems, pages 119- 136, 2001.
-
(2001)
Workshop on Practice and Theory in Public Key Cryptosystems
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
26
-
-
12244263240
-
Efficient private matching and set intersection
-
Michael Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In EUROCRYPT, 2004.
-
(2004)
EUROCRYPT
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
28
-
-
34547720829
-
Honest-verifier private disjointness testing without random oracles
-
S. Hohenberger and S. Weis. Honest-verifier private disjointness testing without random oracles. In PETS, 2006.
-
(2006)
PETS
-
-
Hohenberger, S.1
Weis, S.2
-
29
-
-
84893240286
-
Fast and private computation of cardinality of set intersection and union
-
E. De Cristofaro, P. Gasti, and G. Tsudik. Fast and Private Computation of Cardinality of Set Intersection and Union. In CANS, 2012.
-
(2012)
CANS
-
-
Cristofaro, E.D.1
Gasti, P.2
Tsudik, G.3
-
30
-
-
38049094878
-
Privacy-preserving set operations
-
Lea Kissner and Dawn Song. Privacy-preserving set operations. In CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Kissner, L.1
Song, D.2
-
31
-
-
77958056561
-
Fast secure computation of set intersection
-
S. Jarecki and X. Liu. Fast secure computation of set intersection. In SCN, 2010.
-
(2010)
SCN
-
-
Jarecki, S.1
Liu, X.2
-
32
-
-
84937689417
-
Scaling private set intersection to billion-element sets
-
Seny Kamara, Payman Mohassel, Mariana Raykova, and Saeed Sadeghian. Scaling private set intersection to billion-element sets. In FC, 2014.
-
(2014)
FC
-
-
Kamara, S.1
Mohassel, P.2
Raykova, M.3
Sadeghian, S.4
-
33
-
-
84888990465
-
When private set intersection meets big data: An efficient and scalable protocol
-
Changyu Dong, Liqun Chen, and Zikai Wen. When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. In CCS, 2013.
-
(2013)
CCS
-
-
Dong, C.1
Chen, L.2
Wen, Z.3
-
34
-
-
85076311386
-
Faster private set intersection based on ot extension
-
Benny Pinkas, Thomas Schneider, and Michael Zohner. Faster private set intersection based on ot extension. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Pinkas, B.1
Schneider, T.2
Zohner, M.3
-
35
-
-
57949088292
-
Conjunctive, subset, and range queries on encrypted data
-
Dan Boneh and Brent Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. In TCC, 2007.
-
(2007)
TCC
-
-
Boneh, D.1
Waters, B.2
-
36
-
-
79959823910
-
Remote data checking using provable data possession
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song. Remote data checking using provable data possession. TISSEC, 14(1):12, 2011.
-
(2011)
TISSEC
, vol.14
, Issue.1
, pp. 12
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
37
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS. 2009.
-
(2009)
ESORICS
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
38
-
-
74049095755
-
Compact proofs of retrievability
-
Hovav Shacham and Brent Waters. Compact proofs of retrievability. In ASIACRYPT. 2008.
-
(2008)
ASIACRYPT
-
-
Shacham, H.1
Waters, B.2
-
39
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
Ari Juels and Burton S Kaliski Jr. PORs: Proofs of retrievability for large files. In CCS, 2007.
-
(2007)
CCS
-
-
Juels, A.1
Kaliski, B.S.2
-
40
-
-
77953295132
-
Privacypreserving public auditing for data storage security in cloud computing
-
Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou. Privacypreserving public auditing for data storage security in cloud computing. In INFOCOM, 2010.
-
(2010)
INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
41
-
-
0003625004
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy Preserving Data Mining. In CRYPTO, 2000.
-
(2000)
CRYPTO
-
-
Lindell, Y.1
Pinkas, B.2
-
42
-
-
0041783510
-
Privacy-preserving data mining
-
Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. ACM Sigmod Record, 29(2), 2000.
-
(2000)
ACM Sigmod Record
, vol.29
, Issue.2
-
-
Agrawal, R.1
Srikant, R.2
-
43
-
-
84881255209
-
Privacy-preserving ridge regression on hundreds of millions of records
-
Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, and Nina Taft. Privacy-preserving ridge regression on hundreds of millions of records. In S&P, 2013.
-
(2013)
S&P
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
44
-
-
84927517111
-
Privacy-preserving cooperative statistical analysis
-
Wenliang Du and Mikhail J Atallah. Privacy-preserving cooperative statistical analysis. In ACSAC, 2001.
-
(2001)
ACSAC
-
-
Du, W.1
Atallah, M.J.2
-
45
-
-
85168150014
-
Private set intersection: Are garbled circuits better than custom protocols?
-
Y. Huang, D. Evans, and J. Katz. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? In NDSS, 2012.
-
(2012)
NDSS
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
-
46
-
-
77958038685
-
Practical private set intersection protocols with linear complexity
-
E. De Cristofaro and G. Tsudik. Practical private set intersection protocols with linear complexity. In FC, 2010.
-
(2010)
FC
-
-
Cristofaro, E.D.1
Tsudik, G.2
-
47
-
-
84893224383
-
Experimenting with fast private set intersection
-
E. De Cristofaro and G. Tsudik. Experimenting with fast private set intersection. In TRUST, 2012.
-
(2012)
TRUST
-
-
Cristofaro, E.D.1
Tsudik, G.2
-
48
-
-
84937711715
-
Efficient and privacy-preserving common friend-finder protocols and applications
-
Do I know you?
-
Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N Asokan, and Ahmad-Reza Sadeghi. Do I know you?: Efficient and privacy-preserving common friend-finder protocols and applications. In ACSAC, 2013.
-
(2013)
ACSAC
-
-
Nagy, M.1
Cristofaro, E.D.2
Dmitrienko, A.3
Asokan, N.4
Sadeghi, A.-R.5
-
50
-
-
84937697817
-
Public-key encrypted bloom filters with applications to supply chain integrity
-
Florian Kerschbaum. Public-key encrypted Bloom filters with applications to supply chain integrity. In Data and Applications Security and Privacy. 2011.
-
(2011)
Data and Applications Security and Privacy
-
-
Kerschbaum, F.1
-
52
-
-
80755127495
-
Privacy-preserving queries over relational databases
-
Femi Olumofin and Ian Goldberg. Privacy-preserving Queries over Relational Databases. In PETS, 2010.
-
(2010)
PETS
-
-
Olumofin, F.1
Goldberg, I.2
-
54
-
-
24344436696
-
Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
Jun Xu, Jinliang Fan, Mostafa H Ammar, and Sue B Moon. Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In ICNP, 2002.
-
(2002)
ICNP
-
-
Xu, J.1
Fan, J.2
Ammar, M.H.3
Moon, S.B.4
-
55
-
-
57349112634
-
User 4xxxxx9: Anonymizing query logs
-
Eytan Adar. User 4xxxxx9: Anonymizing query logs. In Query Log Analysis Workshop, 2007.
-
(2007)
Query Log Analysis Workshop
-
-
Adar, E.1
-
56
-
-
77955220391
-
Playing devil's advocate: Inferring sensitive information from anonymized network traces
-
Scott E Coull, Charles V Wright, Fabian Monrose, Michael P Collins, Michael K Reiter, et al. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. In NDSS, 2007.
-
(2007)
NDSS
-
-
Coull, S.E.1
Wright, C.V.2
Monrose, F.3
Collins, M.P.4
Reiter, M.K.5
-
57
-
-
77955143560
-
Dialing privacy and utility: A proposed data-sharing framework to advance Internet research
-
Erin Kenneally and Kimberly Claffy. Dialing privacy and utility: A proposed data-sharing framework to advance Internet research. IEEE S&P, 8(4), 2010.
-
(2010)
IEEE S&P
, vol.8
, Issue.4
-
-
Kenneally, E.1
Claffy, K.2
-
58
-
-
70249116116
-
Evaluating the utility of anonymized network traces for intrusion detection
-
Kiran Lakkaraju and Adam Slagell. Evaluating the utility of anonymized network traces for intrusion detection. In SECURECOMM, 2008.
-
(2008)
SECURECOMM
-
-
Lakkaraju, K.1
Slagell, A.2
-
59
-
-
85059753615
-
BotGrep: Finding bots with structured graph analysis
-
Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, and Nikita Borisov. BotGrep: Finding Bots with Structured Graph Analysis. In Usenix Security, 2010.
-
(2010)
Usenix Security
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
60
-
-
84937690787
-
-
Titan Threat Intelligence System. http://www.gtresearchnews.gatech.edu/titan-threat-intelligence-system/, 2013.
-
(2013)
Titan Threat Intelligence System
-
-
|