Filters








63 Hits in 4.0 sec

Personal data vaults

Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark Hansen, Ramesh Govindan
2010 Proceedings of the 6th International COnference on - Co-NEXT '10  
To reduce the burden on users and improve usability, we explore three mechanisms for managing data policies: Granular ACL, Trace-audit and Rule Recommender.  ...  We present Personal Data Vaults (PDVs), a privacy architecture in which individuals retain ownership of their data.  ...  privacy policies.  ... 
doi:10.1145/1921168.1921191 dblp:conf/conext/MunHMSBEHG10 fatcat:vs65evoybjcw3jcqh67fdzv2lq

A Flexible Architecture for Privacy-Aware Trust Management

Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone
2010 Journal of Theoretical and Applied Electronic Commerce Research  
KPI Trust Policy Language The KPI trust service is a modular component that can be invoked by means of KPI estimation requests, which are specified as SQL-like queries.  ...  evaluate queries based on different trust policies.  ...  Böhm Privacy enhancement for KPITM Factors of KPIs are already precomputed scores which are typically available to any one who is allowed to see the resulting KPI score.  ... 
doi:10.4067/s0718-18762010000200006 fatcat:ngoazfkhjbc4rigbbsq6dc4yii

Blind Seer: A Scalable Private DBMS

Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos Keromytis, Steve Bellovin
2014 2014 IEEE Symposium on Security and Privacy  
weak guarantee of privacy.  ...  In particular, we allow leakage of some search pattern information, but protect the query and data, provide a high level of privacy for individual terms in the executed search formula, and hide the difference  ...  Finally, we thank our colleagues from other IARPA SPAR teams for great collaboration and exchange of ideas.  ... 
doi:10.1109/sp.2014.30 dblp:conf/sp/PappasKVKMCGKB14 fatcat:muuma54ttnhktbsf3fakm2soom

Towards an information infrastructure for the grid

S. Bourbonnais, V. M. Gogate, L. M. Haas, R. W. Horman, S. Malaika, I. Narang, V. Raman
2004 IBM Systems Journal  
The infrastructure supports a virtualized view of the computing and data resources, is autonomic (driven by policies) in order to meet application goals for quality of service, and is compatible with the  ...  In this paper we present our vision of an information infrastructure for grid computing, which is based on a service-oriented architecture.  ...  For example, at the top, materializing the result of an SQL query or a Web service requires much precomputation (making queries against the cache exceptionally quickly) but might be reusable only if the  ... 
doi:10.1147/sj.434.0665 fatcat:wu63adtytfgmpdbulhnx7u6zwu

Welcome Message from the General Chair

2006 International Conference on Dependable Systems and Networks (DSN'06)  
We are grateful to all members of these committees for their time and efforts.  ...  Thanks to the efforts of programme committees, authors, and the VLDB Endowment over the years, VLDB conferences constitute today a prestigious scientific forum for the presentation and exchange of research  ...  compiled similar guides for ICSE 2001 and RE 2001, respectively  ... 
doi:10.1109/dsn.2006.75 dblp:conf/dsn/X06 fatcat:k4duddvbk5glboxkqxkkfsh4p4

Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies [chapter]

Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner, Torsten Schlotmann
2012 Lecture Notes in Computer Science  
in a policy, in particular for the sake of privacy.  ...  select-project sentences for policies and queries; we design an efficient signature-based enforcement mechanism that we implement for an Oracle/SQL-system.  ...  We would like to sincerely thank Martin Bring and Jaouad Zarouali for improving the implementation and conducting the experiments.  ... 
doi:10.1007/978-3-642-31540-4_5 fatcat:hxa36ucqtjfatipqazn53qhaty

Securing Web Applications with Secure Coding Practices and Integrity Verification

Arafa Anis, Mohammad Zulkernine, Shahrear Iqbal, Clifford Liem, Catherine Chambers
2018 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)  
Integrating security features should be part of the development process for these web applications to prevent unwanted attacks.  ...  The concept of security in web applications is not new. However, it is often ignored in the development stages of the web applications.  ...  For conforming to the guidelines of this policy, developers will need to add checks for every input and redefine SQL queries.  ... 
doi:10.1109/dasc/picom/datacom/cyberscitec.2018.00112 dblp:conf/dasc/AnisZILC18 fatcat:godb5lbfqbfhlob4dev35qyu4u

Point-of-Interest Recommendation [chapter]

2017 Encyclopedia of GIS  
Computational Epidemiology is the development and use of computer models for the spatio-temporal diffusion of disease through populations.  ...  and insect feeding patterns for mosquito-borne diseases.  ...  Early technological solutions for data privacy include data encryption for communication and storage, operating system and database access control, and auditing.  ... 
doi:10.1007/978-3-319-17885-1_100975 fatcat:myyebmb3hrhgnpqmobyyvm2xum

A new paradigm for accelerating clinical data science at Stanford Medicine [article]

Somalee Datta, Jose Posada, Garrick Olson, Wencheng Li, Ciaran O'Reilly, Deepa Balraj, Joseph Mesterhazy, Joseph Pallas, Priyamvada Desai, Nigam Shah
2020 arXiv   pre-print
Stanford Medicine is building a new data platform for our academic research community to do better clinical data science.  ...  In this platform, data is anonymized to preserve patient data privacy and made available preparatory to Institutional Review Board (IRB) submission.  ...  We thank Odysseus Data Services Inc for the performance benchmarking of BigQuery for OHDSI ATLAS tool. We acknowledge the support of the broader Technology Bibliography:  ... 
arXiv:2003.10534v1 fatcat:mbsbmigcrjhxtazfsqlrlvkmju

29th International Conference on Data Engineering [book of abstracts]

2013 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW)  
We have implemented these ThU/11 three designs in SQL Server 2012. For each design, both the write-through and write-back SSD caching policies were implemented.  ...  In this paper, we propose the notion of SELECT triggers that extends triggers to work for SELECT queries in order to facilitate data auditing.  ... 
doi:10.1109/icdew.2013.6547409 fatcat:wadzpuh3b5htli4mgb4jreoika

Proactive Security Auditing in Clouds [chapter]

Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
2019 Advances in Information Security  
During the first phase, we propose a runtime security auditing system for the user-level of the cloud; where our proposed system audits wide range of security properties relevant to different authentication  ...  Abstract Proactive Security Auditing for Clouds Suryadipta Majumdar, Ph.D.  ...  Our experiment shows the time for both properties remains almost the same for different datasets, because most operations during this step are database queries; SQL queries for our different datasets almost  ... 
doi:10.1007/978-3-030-23128-6_6 fatcat:b6exjivobrfg5pju3d2eqx6jvu

Precise, dynamic information flow for database-backed applications

Jean Yang, Travis Hance, Thomas H. Austin, Armando Solar-Lezama, Cormac Flanagan, Stephen Chong
2016 Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI 2016  
of termination-insensitive non-interference and policy compliance for the semantics.  ...  In this paper, we present a programming model that factors out information flow policies from application code and database queries, a dynamic semantics for the underlying λ^JDB core language, and proofs  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Government.  ... 
doi:10.1145/2908080.2908098 dblp:conf/pldi/YangHASFC16 fatcat:mfechzparvcjpebycenysat2oa

Precise, dynamic information flow for database-backed applications

Jean Yang, Travis Hance, Thomas H. Austin, Armando Solar-Lezama, Cormac Flanagan, Stephen Chong
2016 SIGPLAN notices  
of termination-insensitive non-interference and policy compliance for the semantics.  ...  In this paper, we present a programming model that factors out information flow policies from application code and database queries, a dynamic semantics for the underlying λ JDB core language, and proofs  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Government.  ... 
doi:10.1145/2980983.2908098 fatcat:5gelbakazvfgffak57ash3ff3y

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications.  ...  This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies.  ...  Some data virtualization tools work with a query language like SQL, while other tools use a drag-and-drop interface.  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Applying Secure Multi-Party Computation In Practice

Riivo Talviste
2017 Zenodo  
The main contribution of this work is an end-to-end process description of deploying secure multi-party computation for the first large-scale registry-based statistical study on linked databases.  ...  We will first give a brief overview of the current state of the art, bring out several shortcomings and address them.  ...  In relational algebra and Structured Query Language (SQL), this is called equi-join.  ... 
doi:10.5281/zenodo.1116316 fatcat:jhzsyrgt2beptj6jdb6axtvzfy
« Previous Showing results 1 — 15 out of 63 results