A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Personal data vaults
2010
Proceedings of the 6th International COnference on - Co-NEXT '10
To reduce the burden on users and improve usability, we explore three mechanisms for managing data policies: Granular ACL, Trace-audit and Rule Recommender. ...
We present Personal Data Vaults (PDVs), a privacy architecture in which individuals retain ownership of their data. ...
privacy policies. ...
doi:10.1145/1921168.1921191
dblp:conf/conext/MunHMSBEHG10
fatcat:vs65evoybjcw3jcqh67fdzv2lq
A Flexible Architecture for Privacy-Aware Trust Management
2010
Journal of Theoretical and Applied Electronic Commerce Research
KPI Trust Policy Language The KPI trust service is a modular component that can be invoked by means of KPI estimation requests, which are specified as SQL-like queries. ...
evaluate queries based on different trust policies. ...
Böhm
Privacy enhancement for KPITM Factors of KPIs are already precomputed scores which are typically available to any one who is allowed to see the resulting KPI score. ...
doi:10.4067/s0718-18762010000200006
fatcat:ngoazfkhjbc4rigbbsq6dc4yii
Blind Seer: A Scalable Private DBMS
2014
2014 IEEE Symposium on Security and Privacy
weak guarantee of privacy. ...
In particular, we allow leakage of some search pattern information, but protect the query and data, provide a high level of privacy for individual terms in the executed search formula, and hide the difference ...
Finally, we thank our colleagues from other IARPA SPAR teams for great collaboration and exchange of ideas. ...
doi:10.1109/sp.2014.30
dblp:conf/sp/PappasKVKMCGKB14
fatcat:muuma54ttnhktbsf3fakm2soom
Towards an information infrastructure for the grid
2004
IBM Systems Journal
The infrastructure supports a virtualized view of the computing and data resources, is autonomic (driven by policies) in order to meet application goals for quality of service, and is compatible with the ...
In this paper we present our vision of an information infrastructure for grid computing, which is based on a service-oriented architecture. ...
For example, at the top, materializing the result of an SQL query or a Web service requires much precomputation (making queries against the cache exceptionally quickly) but might be reusable only if the ...
doi:10.1147/sj.434.0665
fatcat:wu63adtytfgmpdbulhnx7u6zwu
Welcome Message from the General Chair
2006
International Conference on Dependable Systems and Networks (DSN'06)
We are grateful to all members of these committees for their time and efforts. ...
Thanks to the efforts of programme committees, authors, and the VLDB Endowment over the years, VLDB conferences constitute today a prestigious scientific forum for the presentation and exchange of research ...
compiled similar guides for ICSE 2001 and RE 2001, respectively ...
doi:10.1109/dsn.2006.75
dblp:conf/dsn/X06
fatcat:k4duddvbk5glboxkqxkkfsh4p4
Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies
[chapter]
2012
Lecture Notes in Computer Science
in a policy, in particular for the sake of privacy. ...
select-project sentences for policies and queries; we design an efficient signature-based enforcement mechanism that we implement for an Oracle/SQL-system. ...
We would like to sincerely thank Martin Bring and Jaouad Zarouali for improving the implementation and conducting the experiments. ...
doi:10.1007/978-3-642-31540-4_5
fatcat:hxa36ucqtjfatipqazn53qhaty
Securing Web Applications with Secure Coding Practices and Integrity Verification
2018
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
Integrating security features should be part of the development process for these web applications to prevent unwanted attacks. ...
The concept of security in web applications is not new. However, it is often ignored in the development stages of the web applications. ...
For conforming to the guidelines of this policy, developers will need to add checks for every input and redefine SQL queries. ...
doi:10.1109/dasc/picom/datacom/cyberscitec.2018.00112
dblp:conf/dasc/AnisZILC18
fatcat:godb5lbfqbfhlob4dev35qyu4u
Point-of-Interest Recommendation
[chapter]
2017
Encyclopedia of GIS
Computational Epidemiology is the development and use of computer models for the spatio-temporal diffusion of disease through populations. ...
and insect feeding patterns for mosquito-borne diseases. ...
Early technological solutions for data privacy include data encryption for communication and storage, operating system and database access control, and auditing. ...
doi:10.1007/978-3-319-17885-1_100975
fatcat:myyebmb3hrhgnpqmobyyvm2xum
A new paradigm for accelerating clinical data science at Stanford Medicine
[article]
2020
arXiv
pre-print
Stanford Medicine is building a new data platform for our academic research community to do better clinical data science. ...
In this platform, data is anonymized to preserve patient data privacy and made available preparatory to Institutional Review Board (IRB) submission. ...
We thank Odysseus Data Services Inc for the performance benchmarking of BigQuery for OHDSI ATLAS tool. We acknowledge the support of the broader Technology Bibliography: ...
arXiv:2003.10534v1
fatcat:mbsbmigcrjhxtazfsqlrlvkmju
29th International Conference on Data Engineering [book of abstracts]
2013
2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW)
We have implemented these ThU/11 three designs in SQL Server 2012. For each design, both the write-through and write-back SSD caching policies were implemented. ...
In this paper, we propose the notion of SELECT triggers that extends triggers to work for SELECT queries in order to facilitate data auditing. ...
doi:10.1109/icdew.2013.6547409
fatcat:wadzpuh3b5htli4mgb4jreoika
Proactive Security Auditing in Clouds
[chapter]
2019
Advances in Information Security
During the first phase, we propose a runtime security auditing system for the user-level of the cloud; where our proposed system audits wide range of security properties relevant to different authentication ...
Abstract Proactive Security Auditing for Clouds Suryadipta Majumdar, Ph.D. ...
Our experiment shows the time for both properties remains almost the same for different datasets, because most operations during this step are database queries; SQL queries for our different datasets almost ...
doi:10.1007/978-3-030-23128-6_6
fatcat:b6exjivobrfg5pju3d2eqx6jvu
Precise, dynamic information flow for database-backed applications
2016
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI 2016
of termination-insensitive non-interference and policy compliance for the semantics. ...
In this paper, we present a programming model that factors out information flow policies from application code and database queries, a dynamic semantics for the underlying λ^JDB core language, and proofs ...
The views and conclusions contained herein are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Government. ...
doi:10.1145/2908080.2908098
dblp:conf/pldi/YangHASFC16
fatcat:mfechzparvcjpebycenysat2oa
Precise, dynamic information flow for database-backed applications
2016
SIGPLAN notices
of termination-insensitive non-interference and policy compliance for the semantics. ...
In this paper, we present a programming model that factors out information flow policies from application code and database queries, a dynamic semantics for the underlying λ JDB core language, and proofs ...
The views and conclusions contained herein are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Government. ...
doi:10.1145/2980983.2908098
fatcat:5gelbakazvfgffak57ash3ff3y
D5.1 Key Technologies for IoT Data Management Benchmark
2021
Zenodo
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications. ...
This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies. ...
Some data virtualization tools work with a query language like SQL, while other tools use a drag-and-drop interface. ...
doi:10.5281/zenodo.5084813
fatcat:ssllddbo7rda7fadthu26ajrzu
Applying Secure Multi-Party Computation In Practice
2017
Zenodo
The main contribution of this work is an end-to-end process description of deploying secure multi-party computation for the first large-scale registry-based statistical study on linked databases. ...
We will first give a brief overview of the current state of the art, bring out several shortcomings and address them. ...
In relational algebra and Structured Query Language (SQL), this is called equi-join. ...
doi:10.5281/zenodo.1116316
fatcat:jhzsyrgt2beptj6jdb6axtvzfy
« Previous
Showing results 1 — 15 out of 63 results