Jaideep Vaidya

Orcid: 0000-0002-7420-6947

According to our database1, Jaideep Vaidya authored at least 237 papers between 2002 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2021, "for contributions to privacy protection in data analytics and access control management".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Orchestration and Management of Adaptive IoT-Centric Distributed Applications.
IEEE Internet Things J., February, 2024

2023
Identifying Anomalies While Preserving Privacy.
IEEE Trans. Knowl. Data Eng., December, 2023

Privacy-preserving federated genome-wide association studies via dynamic sampling.
Bioinform., October, 2023

Collaborative Business Process Fault Resolution in the Services Cloud.
IEEE Trans. Serv. Comput., 2023

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing.
IEEE Trans. Knowl. Data Eng., 2023

Enabling Attribute-Based Access Control in NoSQL Databases.
IEEE Trans. Emerg. Top. Comput., 2023

MALITE: Lightweight Malware Detection and Classification for Constrained Devices.
CoRR, 2023

Privacy preserving identification of population stratification for collaborative genomic research.
Bioinform., 2023

Preserving Missing Data Distribution in Synthetic Data.
Proceedings of the ACM Web Conference 2023, 2023

Message from the General Chairs and PC Chairs TPS-ISA 2023.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Ensuring Trust in Genomics Research.
Proceedings of the 5th IEEE International Conference on Trust, 2023

SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

2022
A Framework for Dynamic Composition and Management of Emergency Response Processes.
IEEE Trans. Serv. Comput., 2022

Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Proc. Priv. Enhancing Technol., 2022

Intelligent Pandemic Surveillance via Privacy-Preserving Crowdsensing.
IEEE Intell. Syst., 2022

A Study of Users' Privacy Preferences for Data Sharing on Symptoms-Tracking/Health App.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2022

Impact of Dimensionality Reduction on Outlier Detection: an Empirical Study.
Proceedings of the 4th IEEE International Conference on Trust, 2022

PAMMELA: Policy Administration Methodology using Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Contemporaneous Update and Enforcement of ABAC Policies.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

An Integrated Framework for Fault Resolution in Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2022

Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users.
Proceedings of the Information for a Better World: Shaping the Global Future - 17th International Conference, iConference 2022, Virtual Event, February 28, 2022

A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

BP-DEBUG: A Fault Debugging and Resolution Tool for Business Processes.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Enabling Attribute-Based Access Control in Linux Kernel.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy.
Proceedings of the AMIA 2022, 2022

2021

ASSEMBLE: Attribute, Structure and Semantics Based Service Mapping Approach for Collaborative Business Process Development.
IEEE Trans. Serv. Comput., 2021

Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.
ACM Trans. Manag. Inf. Syst., 2021

Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
IEEE Trans. Emerg. Top. Comput., 2021

Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling.
Inf. Polity, 2021

Efficient verification for outsourced genome-wide association studies.
J. Biomed. Informatics, 2021

Privacy-Preserving Analytics in the Big Data Environment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

A Service-oriented Framework for Developing Personalized Patient Care Plans for COVID-19.
Proceedings of the DG.O'21: The 22nd Annual International Conference on Digital Government Research, 2021

Attribute-Based Access Control for NoSQL Databases.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Incremental Maintenance of ABAC Policies.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Privacy-Preserving Federated Biomedical Data Analysis.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

Accurately and Privately Reporting Crowdsensed COVID-19 Data.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

2020
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.
ACM Trans. Manag. Inf. Syst., 2020

Location-based Sentiment Analyses and Visualization of Twitter Election Data.
Digit. Gov. Res. Pract., 2020

Securely Connecting Wearables to Displays.
Computer, 2020

Efficient determination of equivalence for encrypted data.
Comput. Secur., 2020

Privacy-Preserving Friend Recommendation in an Integrated Social Environment.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Blockchain Based Auditable Access Control for Distributed Business Processes.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

BP-Com: A Service Mapping Tool for Rapid Development of Business Processes.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Publishing Video Data with Indistinguishable Objects.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020

2019
Policy Adaptation in Hierarchical Attribute-based Access Control Systems.
ACM Trans. Internet Techn., 2019

Deploying ABAC policies using RBAC systems.
J. Comput. Secur., 2019

Security analysis of ABAC under an administrative model.
IET Inf. Secur., 2019

Advances in Hardware Trojan Detection.
Computer, 2019

Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Comput. Secur., 2019

Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources.
Proceedings of the First IEEE International Conference on Trust, 2019

Security Analysis of Unified Access Control Policies.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

VisMAP: Visual Mining of Attribute-Based Access Control Policies.
Proceedings of the Information Systems Security - 15th International Conference, 2019

Policy Reconciliation and Migration in Attribute Based Access Control.
Proceedings of the Information Systems Security - 15th International Conference, 2019

Social Media Communication of Public Sector Organizations: A Case Study of Northeast US.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019

ABACaaS: Attribute-Based Access Control as a Service.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

How to Accurately and Privately Identify Anomalies.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Vertically Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Inf. Forensics Secur., 2018

Editorial.
IEEE Trans. Dependable Secur. Comput., 2018

Towards designing robust CAPTCHAs.
J. Comput. Secur., 2018

A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
J. Comput. Secur., 2018

Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage.
IEEE Internet Comput., 2018

Differentially Private Outlier Detection in a Collaborative Environment.
Int. J. Cooperative Inf. Syst., 2018

Securely Solving the Distributed Graph Coloring Problem.
CoRR, 2018

Privacy-Preserving Statistics.
Computer, 2018

Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

ASSEMBLE: a collaborative business process development tool.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Analysis and visualization of subjectivity and polarity of Twitter location data.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Web-based application for sentiment analysis of live tweets.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Emergency response plan recommendation and composition system (ERPRCS).
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Enabling the Deployment of ABAC Policies in RBAC Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Policy Engineering in RBAC and ABAC.
Proceedings of the From Database to Cyber Security, 2018

2017
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems.
ACM Trans. Manag. Inf. Syst., 2017

Privacy-preserving item-based recommendations over partitioned data with overlaps.
Int. J. Bus. Inf. Syst., 2017

Migrating from RBAC to temporal RBAC.
IET Inf. Secur., 2017

Analysis of political discourse on twitter in the context of the 2016 US presidential elections.
Gov. Inf. Q., 2017

Evaluating the Privacy Implications of Frequent Itemset Disclosure.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Secure and Efficient k-NN Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Poster: Constrained Policy Mining in Attribute Based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Sentiment based Analysis of Tweets during the US Presidential Elections.
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017

Preventing Unauthorized Data Flows.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Friends are forever? Evolution of active friendship clusters in online social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Efficient Bottom-Up Mining of Attribute Based Access Control Policies.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

A Scalable Privacy-preserving Data Generation Methodology for Exploratory Analysis.
Proceedings of the AMIA 2017, 2017

2016
Accurate and efficient query clustering via top ranked search results.
Web Intell., 2016

A Survey of Role Mining.
ACM Comput. Surv., 2016

Privacy Preserving Linear Programming.
CoRR, 2016

Mining temporal roles using many-valued concepts.
Comput. Secur., 2016

PrefRank: Quantification and Aggregation of Subjective User Preferences.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Efficient Evaluation of Authorizations for Video Data.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Deciphering Text from Touchscreen Key Taps.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Collaborative Differentially Private Outlier Detection for Categorical Data.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Minimizing Organizational User Requirement while Meeting Security Constraints.
ACM Trans. Manag. Inf. Syst., 2015

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015

Meeting Cardinality Constraints in Role Mining.
IEEE Trans. Dependable Secur. Comput., 2015

The generalized temporal role mining problem.
J. Comput. Secur., 2015

Statistical Database Auditing Without Query Denial Threat.
INFORMS J. Comput., 2015

Preserving Privacy in Collaborative Business Process Composition.
Proceedings of the SECRYPT 2015, 2015

Enhancing the Security of Image CAPTCHAs Through Noise Addition.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generating Secure Images for CAPTCHAs through Noise Addition.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015

Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.
Proceedings of the Network and System Security - 9th International Conference, 2015

Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Role Mining in the Presence of Separation of Duty Constraints.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Enforcing Separation of Duty in Attribute Based Access Control Systems.
Proceedings of the Information Systems Security - 11th International Conference, 2015

A Privacy-Sensitive Collaborative Approach to Business Process Development.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Migrating from DAC to RBAC.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Private Searching on Streaming Data Based on Keyword Frequency.
IEEE Trans. Dependable Secur. Comput., 2014

A Random Decision Tree Framework for Privacy-Preserving Data Mining.
IEEE Trans. Dependable Secur. Comput., 2014

An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014

Detecting inappropriate access to electronic health records using collaborative filtering.
Mach. Learn., 2014

A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications.
J. Inf. Syst., 2014

Security analysis for temporal role based access control.
J. Comput. Secur., 2014

An optimization framework for role mining.
J. Comput. Secur., 2014

Enhancing the government service experience through QR codes on mobile platforms.
Gov. Inf. Q., 2014

Security analysis of temporal RBAC under an administrative model.
Comput. Secur., 2014

PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014

Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014

Teaching privacy in an interactive fashion.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

More data, more security challenges: integrating analytics in to the information security curriculum.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Efficient Integrity Verification for Outsourced Collaborative Filtering.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Utilizing social media to improve local government responsiveness.
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
AMTRAC: An administrative model for temporal role-based access control.
Comput. Secur., 2013

Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Incorporating Privacy into the Undergraduate Curriculum.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

An Administrative Model for Spatio-Temporal Role Based Access Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Web Services Based Attacks against Image CAPTCHAs.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Community based emergency response.
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013

Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Toward Mining of Temporal Roles.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Structure-aware graph anonymization.
Web Intell. Agent Syst., 2012

Semantics-Based Automated Service Discovery.
IEEE Trans. Serv. Comput., 2012

Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Secur. Comput., 2012

Secure and efficient distributed linear programming.
J. Comput. Secur., 2012

Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Comput., 2012

Privacy Preserving Maximum-Flow Computation in Distributed Graphs.
Proceedings of the 2012 International Conference on Privacy, 2012

Role Mining under Role-Usage Cardinality Constraint.
Proceedings of the Information Security and Privacy Research, 2012

Risk Based Access Control Using Classification.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Analyzing temporal role based access control models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012

Anonymizing set-valued data by nonreciprocal recoding.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Boolean Matrix Decomposition Problem: Theory, Variations and Applications to Data Engineering.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

Privacy in the context of digital government.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012

Using QR codes for enhancing the scope of digital government services.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012

Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Secure composition of cascaded Web services.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Role engineering: from theory to practice.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Statistical Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011

Introduction.
J. Comput. Secur., 2011

A profile anonymization model for location-based services.
J. Comput. Secur., 2011

Secure construction and publication of contingency tables from distributed data.
J. Comput. Secur., 2011

Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Weighted Rank-One Binary Matrix Factorization.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

UICDS-based information sharing among emergency response application systems.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011

An Optimization Model for the Extended Role Mining Problem.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Identifying a critical threat to privacy through automatic image classification.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Privacy-preserving Collaborative Filtering for the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Efficient privacy-preserving similar document detection.
VLDB J., 2010

The role mining problem: A formal perspective.
ACM Trans. Inf. Syst. Secur., 2010

Role Engineering via Prioritized Subset Enumeration.
IEEE Trans. Dependable Secur. Comput., 2010

A unified index structure for efficient enforcement of spatiotemporal authorisations.
Int. J. Inf. Comput. Secur., 2010

Privacy Preserving Integration of Health Care Data.
Int. J. Comput. Model. Algorithms Medicine, 2010

Spatial neighborhood based anomaly detection in sensor datasets.
Data Min. Knowl. Discov., 2010

Anonymization models for directional location based service environments.
Comput. Secur., 2010

Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Privacy-preserving trust verification.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Ensuring Privacy and Security for LBS through Trajectory Partitioning.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Automating Security Configuration and Administration: An Access Control Perspective.
Proceedings of the Advances in Information and Computer Security, 2010

UICDS compliant resource management system for emergency response.
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010

Role Mining in the Presence of Noise.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Vertically Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, 2009

Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, 2009

Privacy-preserving indexing of documents on the network.
VLDB J., 2009

Privacy-Preserving Kth Element Score over Vertically Partitioned Data.
IEEE Trans. Knowl. Data Eng., 2009

Edge-RMP: Minimizing administrative assignments for role-based access control.
J. Comput. Secur., 2009

Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Privacy-preserving linear programming.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Privacy-preserving Naïve Bayes classification.
VLDB J., 2008

Privacy-preserving decision trees over vertically partitioned data.
ACM Trans. Knowl. Discov. Data, 2008

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manuf. Serv. Oper. Manag., 2008

Privacy-preserving SVM classification.
Knowl. Inf. Syst., 2008

Efficient security policy enforcement for the mobile environment.
J. Comput. Secur., 2008

Migrating to optimal RBAC with minimal perturbation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Privacy-preserving link discovery.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

Optimal Boolean Matrix Decomposition: Application to Role Engineering.
Proceedings of the 24th International Conference on Data Engineering, 2008

Secure information sharing and analysis for effective emergency management.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008

The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

The role mining problem: finding a minimal descriptive set of roles.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Enabling Better Medical Image Classification Through Secure Collaboration.
Proceedings of the International Conference on Image Processing, 2007

2006
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Privacy-Preserving SVM Classification on Vertically Partitioned Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

RoleMiner: mining roles using subset enumeration.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Privacy Preserving Data Mining
Advances in Information Security 19, Springer, ISBN: 978-0-387-25886-7, 2006

2005
Secure set intersection cardinality with application to association rule mining.
J. Comput. Secur., 2005

Collusion Set Detection Through Outlier Discovery.
Proceedings of the Intelligence and Security Informatics, 2005

Privacy-Preserving Top-K Queries.
Proceedings of the 21st International Conference on Data Engineering, 2005

Knowledge Discovery from Transportation Network Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

Privacy-Preserving Decision Trees over Vertically Partitioned Data.
Proceedings of the Data and Applications Security XIX, 2005

2004
Privacy-Preserving Data Mining: Why, How, and When.
IEEE Secur. Priv., 2004

Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Privacy-Preserving Outlier Detection.
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), 2004

Privacy-preserving data integration and sharing.
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004

2003
Leveraging the "Multi" in secure multi-party computation.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Privacy-preserving <i>k</i>-means clustering over vertically partitioned data.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

2002
Tools for Privacy Preserving Data Mining.
SIGKDD Explor., 2002

Privacy preserving association rule mining in vertically partitioned data.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002


  Loading...