-
4
-
-
84942683996
-
A cloud-based ehealth architecture for privacy preserving data integration
-
Springer
-
A. Dubovitskaya, V. Urovi, M. Vasirani, K. Aberer, and M. Schumacher, "A cloud-based ehealth architecture for privacy preserving data integration, " in ICT Systems Security and Privacy Protection. Springer, 2015, pp. 585-598.
-
(2015)
ICT Systems Security and Privacy Protection
, pp. 585-598
-
-
Dubovitskaya, A.1
Urovi, V.2
Vasirani, M.3
Aberer, K.4
Schumacher, M.5
-
5
-
-
84876547122
-
Data mining in the real world: Experiences, challenges, and recommendations
-
G. Weiss, "Data mining in the real world: Experiences, challenges, and recommendations. " in DMIN, 2009, pp. 124-130.
-
(2009)
DMIN
, pp. 124-130
-
-
Weiss, G.1
-
6
-
-
33845501387
-
10 challenging problems in data mining research
-
Q. Yang and X. Wu, "10 challenging problems in data mining research, " International Journal of Information Technology & Decision Making, vol. 5, no. 04, pp. 597-604, 2006.
-
(2006)
International Journal of Information Technology & Decision Making
, vol.5
, Issue.4
, pp. 597-604
-
-
Yang, Q.1
Wu, X.2
-
7
-
-
84863338303
-
Two can keep a secret: A distributed architecture for secure database services
-
G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-Molina, K. Kenthapadi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu, "Two can keep a secret: A distributed architecture for secure database services, " in CIDR 2005, 2005, pp. 186-199.
-
(2005)
CIDR 2005
, pp. 186-199
-
-
Aggarwal, G.1
Bawa, M.2
Ganesan, P.3
Garcia-Molina, H.4
Kenthapadi, K.5
Motwani, R.6
Srivastava, U.7
Thomas, D.8
Xu, Y.9
-
8
-
-
84864113565
-
Distributing data for secure database services
-
V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, and R. Motwani, "Distributing data for secure database services, " Transactions on Data Privacy, vol. 5, no. 1, pp. 253-272, 2012.
-
(2012)
Transactions on Data Privacy
, vol.5
, Issue.1
, pp. 253-272
-
-
Ganapathy, V.1
Thomas, D.2
Feder, T.3
Garcia-Molina, H.4
Motwani, R.5
-
9
-
-
38049032965
-
Fragmentation and encryption to enforce privacy in data storage
-
ser. Lecture Notes in Computer Science J. Biskup and J. López, Eds. Springer Berlin Heidelberg
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Fragmentation and encryption to enforce privacy in data storage, " in Computer Security ESORICS 2007, ser. Lecture Notes in Computer Science, J. Biskup and J. López, Eds. Springer Berlin Heidelberg, 2007, vol. 4734, pp. 171-186.
-
(2007)
Computer Security ESORICS 2007
, vol.4734
, pp. 171-186
-
-
Ciriani, V.1
Vimercati Di Capitani De, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
Sep.
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Fragments and loose associations: Respecting privacy in data publishing, " Proc. VLDB Endow., vol. 3, no. 1-2, pp. 1370-1381, Sep. 2010.
-
(2010)
Proc. VLDB Endow.
, vol.3
, Issue.1-2
, pp. 1370-1381
-
-
Vimercati Di Capitani De, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
84927665746
-
Encryption and fragmentation for data confidentiality in the cloud
-
A. Aldini, J. Lopez, and F. Martinelli, Eds. Springer International Publishing
-
S. De Capitani di Vimercati, R. Erbacher, S. Foresti, S. Jajodia, G. Livraga, and P. Samarati, "Encryption and fragmentation for data confidentiality in the cloud, " in Foundations of Security Analysis and Design VII, ser. Lecture Notes in Computer Science, A. Aldini, J. Lopez, and F. Martinelli, Eds. Springer International Publishing, 2014, vol. 8604, pp. 212-243.
-
(2014)
Foundations of Security Analysis and Design VII, Ser. Lecture Notes in Computer Science
, vol.8604
, pp. 212-243
-
-
Vimercati Di Capitani De, S.1
Erbacher, R.2
Foresti, S.3
Jajodia, S.4
Livraga, G.5
Samarati, P.6
-
12
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
C. Park and S. Chee, Eds. Springer Berlin Heidelberg
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, "On private scalar product computation for privacy-preserving data mining, " in Information Security and Cryptology-ICISC 2004, ser. Lecture Notes in Computer Science, C. Park and S. Chee, Eds. Springer Berlin Heidelberg, 2005, vol. 3506, pp. 104-120.
-
(2005)
Information Security and Cryptology-ICISC 2004, Ser. Lecture Notes in Computer Science
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
13
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Zhu, "Tools for privacy preserving distributed data mining, " ACM SiGKDD Explorations Newsletter, vol. 4, no. 2, pp. 28-34, 2002.
-
(2002)
ACM SiGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.5
-
14
-
-
77349092141
-
Privacy-preserving analysis of vertically partitioned data using secure matrix products
-
A. Karr, X. Lin, A. Sanil, and J. Reiter, "Privacy-preserving analysis of vertically partitioned data using secure matrix products, " Journal of Official Statistics, vol. 25, no. 1, p. 125, 2009.
-
(2009)
Journal of Official Statistics
, vol.25
, Issue.1
, pp. 125
-
-
Karr, A.1
Lin, X.2
Sanil, A.3
Reiter, J.4
-
15
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
SIAM
-
W. Du, Y. Han, and S. Chen, "Privacy-preserving multivariate statistical analysis: Linear regression and classification. " in SDM, vol. 4. SIAM, 2004, pp. 222-233.
-
(2004)
SDM
, vol.4
, pp. 222-233
-
-
Du, W.1
Han, Y.2
Chen, S.3
-
16
-
-
26444568172
-
Secrecy of twoparty secure computation
-
Springer
-
Y. Chiang, D. Wang, C. Liau, and T. Hsu, "Secrecy of twoparty secure computation, " in Data and Applications Security XIX. Springer, 2005, pp. 114-123.
-
(2005)
Data and Applications Security XIX
, pp. 114-123
-
-
Chiang, Y.1
Wang, D.2
Liau, C.3
Hsu, T.4
-
17
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
I. Ioannidis, A. Grama, and M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments, " in Proceedings of the International Conference on Parallel Processing. IEEE, 2002, pp. 379-384.
-
(2002)
Proceedings of the International Conference on Parallel Processing. IEEE
, pp. 379-384
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
18
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems. " in Bell System Technical Journal, 1949, vol. 28, pp. 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
|