2025
Privacy-Preserving Model and Preprocessing Verification for Machine Learning.
CoRR, January, 2025
Forty Years of IEEE Intelligent Systems: Heralding Research and Innovation in AI.
IEEE Intell. Syst., 2025
2024
A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis.
Inf. Syst. Frontiers, December, 2024
Orchestration and Management of Adaptive IoT-Centric Distributed Applications.
IEEE Internet Things J., February, 2024
Engravings, Secrets, and Interpretability of Neural Networks.
IEEE Trans. Emerg. Top. Comput., 2024
Efficiently Supporting Attribute-Based Access Control in Linux.
IEEE Trans. Dependable Secur. Comput., 2024
Blockchain-Based Shared Data Integrity Auditing and Deduplication.
IEEE Trans. Dependable Secur. Comput., 2024
Blockchain Based Auditable Access Control for Business Processes With Event Driven Policies.
IEEE Trans. Dependable Secur. Comput., 2024
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Demo: Orchflow: Orchestration and Management of IoT-Centric Distributed Workflows.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
A Graph-Based Framework for ABAC Policy Enforcement and Analysis.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES).
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Identifying Anomalies While Preserving Privacy.
IEEE Trans. Knowl. Data Eng., December, 2023
Privacy-preserving federated genome-wide association studies via dynamic sampling.
Bioinform., October, 2023
Collaborative Business Process Fault Resolution in the Services Cloud.
IEEE Trans. Serv. Comput., 2023
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing.
IEEE Trans. Knowl. Data Eng., 2023
Enabling Attribute-Based Access Control in NoSQL Databases.
IEEE Trans. Emerg. Top. Comput., 2023
MALITE: Lightweight Malware Detection and Classification for Constrained Devices.
CoRR, 2023
Privacy preserving identification of population stratification for collaborative genomic research.
Bioinform., 2023
Preserving Missing Data Distribution in Synthetic Data.
Proceedings of the ACM Web Conference 2023, 2023
Message from the General Chairs and PC Chairs TPS-ISA 2023.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Ensuring Trust in Genomics Research.
Proceedings of the 5th IEEE International Conference on Trust, 2023
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
2022
A Framework for Dynamic Composition and Management of Emergency Response Processes.
IEEE Trans. Serv. Comput., 2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Proc. Priv. Enhancing Technol., 2022
Intelligent Pandemic Surveillance via Privacy-Preserving Crowdsensing.
IEEE Intell. Syst., 2022
A Study of Users' Privacy Preferences for Data Sharing on Symptoms-Tracking/Health App.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2022
Impact of Dimensionality Reduction on Outlier Detection: an Empirical Study.
Proceedings of the 4th IEEE International Conference on Trust, 2022
PAMMELA: Policy Administration Methodology using Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Contemporaneous Update and Enforcement of ABAC Policies.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
An Integrated Framework for Fault Resolution in Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2022
Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users.
Proceedings of the Information for a Better World: Shaping the Global Future - 17th International Conference, iConference 2022, Virtual Event, February 28, 2022
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
BP-DEBUG: A Fault Debugging and Resolution Tool for Business Processes.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Enabling Attribute-Based Access Control in Linux Kernel.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy.
Proceedings of the AMIA 2022, 2022
2021
Information Security and Privacy - Challenges and Outlook.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Advancing Research in Information and Communication Technology, 2021
ASSEMBLE: Attribute, Structure and Semantics Based Service Mapping Approach for Collaborative Business Process Development.
IEEE Trans. Serv. Comput., 2021
Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.
ACM Trans. Manag. Inf. Syst., 2021
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
IEEE Trans. Emerg. Top. Comput., 2021
Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling.
Inf. Polity, 2021
Efficient verification for outsourced genome-wide association studies.
J. Biomed. Informatics, 2021
Privacy-Preserving Analytics in the Big Data Environment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
A Service-oriented Framework for Developing Personalized Patient Care Plans for COVID-19.
Proceedings of the DG.O'21: The 22nd Annual International Conference on Digital Government Research, 2021
Attribute-Based Access Control for NoSQL Databases.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Incremental Maintenance of ABAC Policies.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Privacy-Preserving Federated Biomedical Data Analysis.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021
Accurately and Privately Reporting Crowdsensed COVID-19 Data.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021
2020
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.
ACM Trans. Manag. Inf. Syst., 2020
Location-based Sentiment Analyses and Visualization of Twitter Election Data.
Digit. Gov. Res. Pract., 2020
Securely Connecting Wearables to Displays.
Computer, 2020
Efficient determination of equivalence for encrypted data.
Comput. Secur., 2020
Privacy-Preserving Friend Recommendation in an Integrated Social Environment.
Proceedings of the Information Systems Security - 16th International Conference, 2020
Blockchain Based Auditable Access Control for Distributed Business Processes.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
BP-Com: A Service Mapping Tool for Rapid Development of Business Processes.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Publishing Video Data with Indistinguishable Objects.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020
2019
Policy Adaptation in Hierarchical Attribute-based Access Control Systems.
ACM Trans. Internet Techn., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Deploying ABAC policies using RBAC systems.
J. Comput. Secur., 2019
Security analysis of ABAC under an administrative model.
IET Inf. Secur., 2019
Advances in Hardware Trojan Detection.
Computer, 2019
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Comput. Secur., 2019
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources.
Proceedings of the First IEEE International Conference on Trust, 2019
Security Analysis of Unified Access Control Policies.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
VisMAP: Visual Mining of Attribute-Based Access Control Policies.
Proceedings of the Information Systems Security - 15th International Conference, 2019
Policy Reconciliation and Migration in Attribute Based Access Control.
Proceedings of the Information Systems Security - 15th International Conference, 2019
Social Media Communication of Public Sector Organizations: A Case Study of Northeast US.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019
ABACaaS: Attribute-Based Access Control as a Service.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
How to Accurately and Privately Identify Anomalies.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Vertically Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Inf. Forensics Secur., 2018
Towards designing robust CAPTCHAs.
J. Comput. Secur., 2018
A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
J. Comput. Secur., 2018
Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage.
IEEE Internet Comput., 2018
Differentially Private Outlier Detection in a Collaborative Environment.
Int. J. Cooperative Inf. Syst., 2018
Securely Solving the Distributed Graph Coloring Problem.
CoRR, 2018
Privacy-Preserving Statistics.
Computer, 2018
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
ASSEMBLE: a collaborative business process development tool.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Analysis and visualization of subjectivity and polarity of Twitter location data.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Web-based application for sentiment analysis of live tweets.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Emergency response plan recommendation and composition system (ERPRCS).
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Enabling the Deployment of ABAC Policies in RBAC Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Policy Engineering in RBAC and ABAC.
Proceedings of the From Database to Cyber Security, 2018
2017
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems.
ACM Trans. Manag. Inf. Syst., 2017
Privacy-preserving item-based recommendations over partitioned data with overlaps.
Int. J. Bus. Inf. Syst., 2017
Migrating from RBAC to temporal RBAC.
IET Inf. Secur., 2017
Analysis of political discourse on twitter in the context of the 2016 US presidential elections.
Gov. Inf. Q., 2017
Evaluating the Privacy Implications of Frequent Itemset Disclosure.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Secure and Efficient k-NN Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Poster: Constrained Policy Mining in Attribute Based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Sentiment based Analysis of Tweets during the US Presidential Elections.
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017
Preventing Unauthorized Data Flows.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Friends are forever? Evolution of active friendship clusters in online social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Efficient Bottom-Up Mining of Attribute Based Access Control Policies.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
A Scalable Privacy-preserving Data Generation Methodology for Exploratory Analysis.
Proceedings of the AMIA 2017, 2017
2016
Accurate and efficient query clustering via top ranked search results.
Web Intell., 2016
Privacy Preserving Linear Programming.
CoRR, 2016
Mining temporal roles using many-valued concepts.
Comput. Secur., 2016
PrefRank: Quantification and Aggregation of Subjective User Preferences.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Efficient Evaluation of Authorizations for Video Data.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Deciphering Text from Touchscreen Key Taps.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Collaborative Differentially Private Outlier Detection for Categorical Data.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
2015
Minimizing Organizational User Requirement while Meeting Security Constraints.
ACM Trans. Manag. Inf. Syst., 2015
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015
Meeting Cardinality Constraints in Role Mining.
IEEE Trans. Dependable Secur. Comput., 2015
The generalized temporal role mining problem.
J. Comput. Secur., 2015
Statistical Database Auditing Without Query Denial Threat.
INFORMS J. Comput., 2015
Preserving Privacy in Collaborative Business Process Composition.
Proceedings of the SECRYPT 2015, 2015
Enhancing the Security of Image CAPTCHAs Through Noise Addition.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Generating Secure Images for CAPTCHAs through Noise Addition.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.
Proceedings of the Network and System Security - 9th International Conference, 2015
Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Role Mining in the Presence of Separation of Duty Constraints.
Proceedings of the Information Systems Security - 11th International Conference, 2015
Enforcing Separation of Duty in Attribute Based Access Control Systems.
Proceedings of the Information Systems Security - 11th International Conference, 2015
A Privacy-Sensitive Collaborative Approach to Business Process Development.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Migrating from DAC to RBAC.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Private Searching on Streaming Data Based on Keyword Frequency.
IEEE Trans. Dependable Secur. Comput., 2014
A Random Decision Tree Framework for Privacy-Preserving Data Mining.
IEEE Trans. Dependable Secur. Comput., 2014
An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014
Detecting inappropriate access to electronic health records using collaborative filtering.
Mach. Learn., 2014
A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications.
J. Inf. Syst., 2014
Security analysis for temporal role based access control.
J. Comput. Secur., 2014
An optimization framework for role mining.
J. Comput. Secur., 2014
Enhancing the government service experience through QR codes on mobile platforms.
Gov. Inf. Q., 2014
Security analysis of temporal RBAC under an administrative model.
Comput. Secur., 2014
PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014
Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014
Teaching privacy in an interactive fashion.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
More data, more security challenges: integrating analytics in to the information security curriculum.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014
Efficient Integrity Verification for Outsourced Collaborative Filtering.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
Utilizing social media to improve local government responsiveness.
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014
Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
2013
AMTRAC: An administrative model for temporal role-based access control.
Comput. Secur., 2013
Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Incorporating Privacy into the Undergraduate Curriculum.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
An Administrative Model for Spatio-Temporal Role Based Access Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013
Web Services Based Attacks against Image CAPTCHAs.
Proceedings of the Information Systems Security - 9th International Conference, 2013
Community based emergency response.
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013
Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Toward Mining of Temporal Roles.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Structure-aware graph anonymization.
Web Intell. Agent Syst., 2012
Semantics-Based Automated Service Discovery.
IEEE Trans. Serv. Comput., 2012
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Secur. Comput., 2012
Secure and efficient distributed linear programming.
J. Comput. Secur., 2012
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Comput., 2012
Privacy Preserving Maximum-Flow Computation in Distributed Graphs.
Proceedings of the 2012 International Conference on Privacy, 2012
Role Mining under Role-Usage Cardinality Constraint.
Proceedings of the Information Security and Privacy Research, 2012
Risk Based Access Control Using Classification.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Analyzing temporal role based access control models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012
Anonymizing set-valued data by nonreciprocal recoding.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
Proceedings of the Information Systems Security, 8th International Conference, 2012
Boolean Matrix Decomposition Problem: Theory, Variations and Applications to Data Engineering.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012
Privacy in the context of digital government.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012
Using QR codes for enhancing the scope of digital government services.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012
Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Secure composition of cascaded Web services.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Role engineering: from theory to practice.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011
A profile anonymization model for location-based services.
J. Comput. Secur., 2011
Secure construction and publication of contingency tables from distributed data.
J. Comput. Secur., 2011
Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011
Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Weighted Rank-One Binary Matrix Factorization.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011
UICDS-based information sharing among emergency response application systems.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011
An Optimization Model for the Extended Role Mining Problem.
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Identifying a critical threat to privacy through automatic image classification.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Privacy-preserving Collaborative Filtering for the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
Efficient privacy-preserving similar document detection.
VLDB J., 2010
The role mining problem: A formal perspective.
ACM Trans. Inf. Syst. Secur., 2010
Role Engineering via Prioritized Subset Enumeration.
IEEE Trans. Dependable Secur. Comput., 2010
A unified index structure for efficient enforcement of spatiotemporal authorisations.
Int. J. Inf. Comput. Secur., 2010
Privacy Preserving Integration of Health Care Data.
Int. J. Comput. Model. Algorithms Medicine, 2010
Spatial neighborhood based anomaly detection in sensor datasets.
Data Min. Knowl. Discov., 2010
Anonymization models for directional location based service environments.
Comput. Secur., 2010
Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010
Privacy-preserving trust verification.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Ensuring Privacy and Security for LBS through Trajectory Partitioning.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Automating Security Configuration and Administration: An Access Control Perspective.
Proceedings of the Advances in Information and Computer Security, 2010
UICDS compliant resource management system for emergency response.
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010
Role Mining in the Presence of Noise.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Vertically Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, 2009
Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, 2009
Privacy-preserving indexing of documents on the network.
VLDB J., 2009
Privacy-Preserving Kth Element Score over Vertically Partitioned Data.
IEEE Trans. Knowl. Data Eng., 2009
Edge-RMP: Minimizing administrative assignments for role-based access control.
J. Comput. Secur., 2009
Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Privacy-preserving linear programming.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009
An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009
Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Privacy-preserving Naïve Bayes classification.
VLDB J., 2008
Privacy-preserving decision trees over vertically partitioned data.
ACM Trans. Knowl. Discov. Data, 2008
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manuf. Serv. Oper. Manag., 2008
Privacy-preserving SVM classification.
Knowl. Inf. Syst., 2008
Efficient security policy enforcement for the mobile environment.
J. Comput. Secur., 2008
Migrating to optimal RBAC with minimal perturbation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Privacy-preserving link discovery.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008
Optimal Boolean Matrix Decomposition: Application to Role Engineering.
Proceedings of the 24th International Conference on Data Engineering, 2008
Secure information sharing and analysis for effective emergency management.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008
Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
The role mining problem: finding a minimal descriptive set of roles.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Enabling Better Medical Image Classification Through Secure Collaboration.
Proceedings of the International Conference on Image Processing, 2007
2006
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Privacy-Preserving SVM Classification on Vertically Partitioned Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006
RoleMiner: mining roles using subset enumeration.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Privacy Preserving Data Mining
Advances in Information Security 19, Springer, ISBN: 978-0-387-25886-7, 2006
2005
Secure set intersection cardinality with application to association rule mining.
J. Comput. Secur., 2005
Collusion Set Detection Through Outlier Discovery.
Proceedings of the Intelligence and Security Informatics, 2005
Privacy-Preserving Top-K Queries.
Proceedings of the 21st International Conference on Data Engineering, 2005
Knowledge Discovery from Transportation Network Data.
Proceedings of the 21st International Conference on Data Engineering, 2005
Privacy-Preserving Decision Trees over Vertically Partitioned Data.
Proceedings of the Data and Applications Security XIX, 2005
2004
Privacy preserving data mining over vertically partitioned data
PhD thesis, 2004
Privacy-Preserving Data Mining: Why, How, and When.
IEEE Secur. Priv., 2004
Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004
Privacy-Preserving Outlier Detection.
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), 2004
Privacy-preserving data integration and sharing.
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004
2003
Leveraging the "Multi" in secure multi-party computation.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Privacy-preserving <i>k</i>-means clustering over vertically partitioned data.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003
2002
Tools for Privacy Preserving Data Mining.
SIGKDD Explor., 2002
Privacy preserving association rule mining in vertically partitioned data.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002