Murat Kantarcioglu

According to our database1, Murat Kantarcioglu authored at least 213 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Adversarial Machine Learning
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, 2018

It's all in the timing: calibrating temporal penalties for biomedical data sharing.
JAMIA, 2018

CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.
CoRR, 2018

Breaking Transferability of Adversarial Samples with Randomness.
CoRR, 2018

Enforceable Data Sharing Agreements Using Smart Contracts.
CoRR, 2018

Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries.
CoRR, 2018

Graph Based Proactive Secure Decomposition Algorithm for Context Dependent Attribute Based Inference Control Problem.
CoRR, 2018

Spatial counts under differential privacy mechanism on changing spatial scales.
Computers & Security, 2018

Towards a Privacy-Aware Qunatified Self Data Management Framework.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Data Mining with Algorithmic Transparency.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Forecasting Bitcoin Price with Graph Chainlets.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Adversarial Anomaly Detection Using Centroid-Based Clustering.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

Integrating Cyber Security and Data Science for Social Media: A Position Paper.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018

Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

SmartProvenance: A Distributed, Blockchain Based DataProvenance System.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2017

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2017

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.
IEEE Design & Test, 2017

Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control.
Data Knowl. Eng., 2017

Using Blockchain and smart contracts for secure data provenance management.
CoRR, 2017

Blockchain: A Graph Primer.
CoRR, 2017

Hacking social network data mining.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Secure and Efficient Query Processing over Hybrid Clouds.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Securing Data Analytics on SGX with Randomization.
Proceedings of the Computer Security - ESORICS 2017, 2017

Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

From Myths to Norms: Demystifying Data Mining Models with Instance-Based Transparency.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Building a Dossier on the Cheap: Integrating Distributed Personal Data Resources Under Cost Constraints.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

An Open Source Tool for Game Theoretic Health Data De-Identification.
Proceedings of the AMIA 2017, 2017

Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Proceedings of the 2017 American Control Conference, 2017

2016
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation.
Int. J. Inf. Sec., 2016

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data.
IACR Cryptology ePrint Archive, 2016

CheapSMC: A Framework to Minimize SMC Cost in Cloud.
CoRR, 2016

Modeling Adversarial Learning as Nested Stackelberg Games.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Optimizing secure classification performance with privacy-aware feature selection.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Practical Differentially Private Modeling of Human Movement Data.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Detecting Discrimination in a Black-Box Classifier.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Adversarial Data Mining: Big Data Meets Cyber Security.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A privacy preserving protocol for tracking participants in phase I clinical trials.
Journal of Biomedical Informatics, 2015

Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students.
IEEE Security & Privacy, 2015

SEMROD: Secure and Efficient MapReduce Over HybriD Clouds.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Honeypot based unauthorized data access detection in MapReduce systems.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Design and Implementation of a Semantic Web-Based Inference Controller: A Summary.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Privacy-aware dynamic feature selection.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

BigGate: Access Control Framework for Outsourced Key-Value Stores.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Distributed Search over Encrypted Big Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

A Dynamic Approach to Detect Anomalous Queries on Relational Databases.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

Process-Driven Data Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

AccountableMR: Toward accountable MapReduce systems.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

TrustMR: Computation integrity assurance system for MapReduce.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

2014
Composite Bloom Filters for Secure Record Linkage.
IEEE Trans. Knowl. Data Eng., 2014

Detecting anomalies in social network data consumption.
Social Netw. Analys. Mining, 2014

A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models.
Risk and Decision Analysis, 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Special issue on secure and privacy-aware data management.
Distributed and Parallel Databases, 2014

A Distributed Framework for Scalable Search over Encrypted Documents.
CoRR, 2014

SecureMA: protecting participant privacy in genetic association meta-analysis.
Bioinformatics, 2014

RDF-X: a language for sanitizing RDF graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

Preventing Cryptographic Key Leakage in Cloud Virtual Machines.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Adversarial Learning with Bayesian Hierarchical Mixtures of Experts.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Redaction based RDF access control language.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards fine grained RDF access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Shingled Graph Disassembly: Finding the Undecideable Path.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Silver Lining: Enforcing Secure Information Flow at the Cloud Edge.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

A Hybrid Approach for Privacy-preserving Record Linkage.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

Efficient privacy-aware search over encrypted databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Inference attack against encrypted range queries on outsourced databases.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Vigiles: Fine-Grained Access Control for MapReduce Systems.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage.
Proceedings of the AMIA 2014, 2014

Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

Privacy Issues in Association Rule Mining.
Proceedings of the Frequent Pattern Mining, 2014

Secure Data Provenance and Inference Control with Semantic Web.
CRC Press, ISBN: 978-1-4665-6943-0, 2014

2013
Incentive Compatible Privacy-Preserving Data Analysis.
IEEE Trans. Knowl. Data Eng., 2013

Preventing Private Information Inference Attacks on Social Networks.
IEEE Trans. Knowl. Data Eng., 2013

Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Privacy, 2013

A practical approach to achieve private medical record linkage in light of public resources.
JAMIA, 2013

A secure distributed logistic regression protocol for the detection of rare adverse drug events.
JAMIA, 2013

Experiments in Information Sharing
CoRR, 2013

REDACT: a framework for sanitizing RDF data.
Proceedings of the 22nd International World Wide Web Conference, 2013

Toward a Real-Time Cloud Auditing Paradigm.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Risk Aware Approach to Data Confidentiality in Cloud Computing.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Incentive-Compatible Privacy-Preserving Distributed Data Mining.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Efficient privacy-aware record integration.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient tree pattern queries on encrypted XML documents.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Analysis of heuristic based access pattern obfuscation.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

BigSecret: A Secure Data Management Framework for Key-Value Stores.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Secure multidimensional range queries over outsourced data.
VLDB J., 2012

Secure Management of Biomedical Data With Cryptographic Hardware.
IEEE Trans. Information Technology in Biomedicine, 2012

Incentive Compatible Privacy-Preserving Distributed Classification.
IEEE Trans. Dependable Sec. Comput., 2012

A Hybrid Approach to Private Record Matching.
IEEE Trans. Dependable Sec. Comput., 2012

Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage.
Information Fusion, 2012

Secure Data Processing over Hybrid Clouds.
IEEE Data Eng. Bull., 2012

Policy Enforcement Framework for Cloud Data Management.
IEEE Data Eng. Bull., 2012

Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach
CoRR, 2012

StormRider: harnessing "storm" for social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Tag-based Information Flow Analysis for Document Classification in Provenance.
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012

Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store.
Proceedings of the ISWC 2012 Posters & Demonstrations Track, 2012

A cloud-based RDF policy engine for assured information sharing.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Design and Implementation of a Cloud-Based Assured Information Sharing System.
Proceedings of the Computer Network Security, 2012

Adversarial support vector machine learning.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Secure information integration with a semantic web-based framework.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Sparse Bayesian Adversarial Learning Using Relevance Vector Machine Ensembles.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Self-Training with Selection-by-Rejection.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Efficient Similarity Search over Encrypted Data.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Randomizing Smartphone Malware Profiles against Statistical Mining Techniques.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Studying dynamic equilibrium of cloud computing adoption with application of Mean Field Games.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

Risk-Aware Workload Distribution in Hybrid Clouds.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance.
JAMIA, 2011

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection.
GeoInformatica, 2011

Classifier evaluation and attribute selection against active adversaries.
Data Min. Knowl. Discov., 2011

Secure Data Processing in a Hybrid Cloud
CoRR, 2011

Semantic web-based social network access control.
Computers & Security, 2011

Automatic sanitization of social network data to prevent inference attacks.
Proceedings of the 20th International Conference on World Wide Web, 2011

A Framework for Policies over Provenance.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Transforming provenance using redaction.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Differentiating Code from Data in x86 Binaries.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011

A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Compression for Anti-Adversarial Learning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Extraction of expanded entity phrases.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Identification of related information of interest across free text documents.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Extending the classification of nodes in social networks.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Investment in Privacy-Preserving Technologies under Uncertainty.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Towards privacy preserving access control in the cloud.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Mixture of gaussian models and bayes error under differential privacy.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

A language for provenance access control.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Poster: inference attacks against searchable encryption protocols.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Impact of security risks on cloud computing adoption.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Building Disclosure Risk Aware Query Optimizers for Relational Databases.
PVLDB, 2010

Update-Enabled Triplification of Relational Data into Virtual RDF Stores.
Int. J. Semantic Computing, 2010

Security Issues for Cloud Computing.
IJISP, 2010

A Risk Management Framework for Health Care Data Anonymization.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Incentive Compatible Distributed Data Mining.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Efficient Processing of Large RDF Streams Using Memory Management Algorithms.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

Bi-directional Translation of Relational Data into Virtual RDF Stores.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

When Do Firms Invest in Privacy-Preserving Technologies?
Proceedings of the Decision and Game Theory for Security, 2010

A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model.
Proceedings of the Decision and Game Theory for Security, 2010

Private record matching using differential privacy.
Proceedings of the EDBT 2010, 2010

Scalable and Efficient Reasoning for Enforcing Role-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Secure data storage and retrieval in the cloud.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Data Intensive Query Processing for Large RDF Graphs Using Cloud Computing Tools.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, 2009

Horizontally Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, 2009

A risk management approach to RBAC.
Risk and Decision Analysis, 2009

Formal anonymity models for efficient privacy-preserving joins.
Data Knowl. Eng., 2009

Design and implementation of a secure social network system.
Comput. Syst. Sci. Eng., 2009

Inferring private information using social network data.
Proceedings of the 18th International Conference on World Wide Web, 2009

A Hybrid Technique for Private Location-Based Queries with Database Protection.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Design and implementation of a secure social network system.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

On the mitigation of bioterrorism through game theory.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Social network classification incorporating link type values.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


Using Anonymized Data for Classification.
Proceedings of the 25th International Conference on Data Engineering, 2009

Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Privacy Preserving Decision Tree Mining from Perturbed Data.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

The Challenge of Assuring Data Trustworthiness.
Proceedings of the Database Systems for Advanced Applications, 2009

2008
A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Privacy and Security Challenges in GIS.
Proceedings of the Encyclopedia of GIS., 2008

Geospatial Semantic Web, Definition.
Proceedings of the Encyclopedia of GIS., 2008

Privacy-preserving Naïve Bayes classification.
VLDB J., 2008

Privacy-preserving decision trees over vertically partitioned data.
TKDD, 2008

A Cryptographic Approach to Securely Share and Query Genomic Sequences.
IEEE Trans. Information Technology in Biomedicine, 2008

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manufacturing & Service Operations Management, 2008

Privacy-preserving data mining in the malicious model.
IJICS, 2008

The applicability of the perturbation based privacy preserving data mining for real-world data.
Data Knowl. Eng., 2008

Transforming semi-honest protocols to ensure accountability.
Data Knowl. Eng., 2008

An Approach to Evaluate Data Trustworthiness Based on Data Provenance.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

A Privacy-Preserving Framework for Integrating Person-Specific Databases.
Proceedings of the Privacy in Statistical Databases, 2008

Simulating bioterrorism through epidemiology approximation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A Hybrid Approach to Private Record Linkage.
Proceedings of the 24th International Conference on Data Engineering, 2008

Incentive and Trust Issues in Assured Information Sharing.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Virtual Active Network for Live Streaming Media Delivery.
Journal of Interconnection Networks, 2007

Extended RBAC-based design and implementation for a secure data warehouse.
IJBIDM, 2007

Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Privacy-Preserving Data Mining Applications in the Malicious Model.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

Enforcing Honesty in Assured Information Sharing Within a Distributed System.
Proceedings of the Data and Applications Security XXI, 2007

Design and Analysis of Querying Encrypted Data in Relational Databases.
Proceedings of the Data and Applications Security XXI, 2007

2006
Sovereign Joins.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2005
Security Issues in Querying Encrypted Data.
Proceedings of the Data and Applications Security XIX, 2005

2004
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data.
IEEE Trans. Knowl. Data Eng., 2004

On demand synchronization and load distribution for database grid-based Web applications.
Data Knowl. Eng., 2004

Privately Computing a Distributed k-nn Classifier.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

When do data mining results violate privacy?
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

Privacy-preserving data integration and sharing.
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004

2003
Assuring privacy when big brother is watching.
Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003

2002
Tools for Privacy Preserving Data Mining.
SIGKDD Explorations, 2002

Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data.
Proceedings of the 2002 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2002

2001
Mining Cyclically Repeated Patterns.
Proceedings of the Data Warehousing and Knowledge Discovery, 2001


  Loading...