Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterOctober 2012
Privacy preserving boosting in the cloud with secure half-space queries
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications securityPages 1031–1033https://doi.org/10.1145/2382196.2382315This poster presents a preliminary study on the PerturBoost approach that aims to provide efficient and secure classifier learning in the cloud with both data and model privacy preserved.
- research-articleOctober 2012
On the parameterized complexity of the workflow satisfiability problem
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications securityPages 857–868https://doi.org/10.1145/2382196.2382287A workflow specification defines a set of steps and the order in which those steps must be executed. Security requirements may impose constraints on which groups of users are permitted to perform subsets of those steps. A workflow specification is said ...
- research-articleOctober 2012
On significance of the least significant bits for differential privacy
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications securityPages 650–661https://doi.org/10.1145/2382196.2382264We describe a new type of vulnerability present in many implementations of differentially private mechanisms. In particular, all four publicly available general purpose systems for differentially private computations are susceptible to our attack.
The ...
- research-articleOctober 2012
Differentially private sequential data publication via variable-length n-grams
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications securityPages 638–649https://doi.org/10.1145/2382196.2382263Sequential data is being increasingly used in a variety of applications. Publishing sequential data is of vital importance to the advancement of these applications. However, as shown by the re-identification attacks on the AOL and Netflix datasets, ...