Efficient algorithms for the key representation auditing scheme.
Abstract—A statistical database (SDB) publishes statistical queries (such as sum, average, count, etc) on subsets of records. Sometimes by stitching the answers of some statistics, a malicious user (snooper) may be able to deduce confidential information about some individuals. The key representati...
| Main Authors: | Asim Abdallah, Elshiekh, Dominic P, Dhanapal Durai |
|---|---|
| Format: | Citation Index Journal |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/3226/ http://scholars.utp.edu.my/id/eprint/3226/1/Asim_IJCEE2009.pdf |
Similar Items
Cost estimation for the key representation auditing scheme
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A new auditing scheme for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A comparative representation approach to modern
heuristic search methods in a job shop
by: Dominic P, Dhanapal Durai, et al.
Published: (2008)
by: Dominic P, Dhanapal Durai, et al.
Published: (2008)
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
Quality evaluation of e-government website using web diagnostic tools: Asian case
by: Jati, H., et al.
Published: (2009)
by: Jati, H., et al.
Published: (2009)
Human skin detection using defined skin region
by: Jati, H., et al.
Published: (2008)
by: Jati, H., et al.
Published: (2008)
Website accessibility performance evaluation in Malaysia
by: Jati, H., et al.
Published: (2008)
by: Jati, H., et al.
Published: (2008)
Human skin detection using defined skin region
by: Jati, H., et al.
Published: (2008)
by: Jati, H., et al.
Published: (2008)
Conceptualization of the Antecedents and Impacts of KMS Utilization: A preliminary framework.
by: Ishaq, Oyefolahan, et al.
Published: (2010)
by: Ishaq, Oyefolahan, et al.
Published: (2010)
Strategic IT Alignment with Business Strategy:
Service Oriented Architecture Approach
by: Mohammad, Abdi, et al.
Published: (2010)
by: Mohammad, Abdi, et al.
Published: (2010)
INVESTIGATING KNOWLEDGE MANAGEMENT SYSTEMS UTILIZATION ANTECEDENTS: A CONCEPTUAL FRAMEWORK FOR EMPIRICAL INVESTIGATION
by: Oyefolahan, Ishaq, et al.
Published: (2010)
by: Oyefolahan, Ishaq, et al.
Published: (2010)
A Simulated Annealing Approach to Solve Fuzzy
Multi-Objective Linear Model for Supplier Selection
in a Supply Chain
by: Parthiban, P, et al.
Published: (2010)
by: Parthiban, P, et al.
Published: (2010)
Lean principles in IT services: a case study on implementation and best practices
by: Suresh, malladi, et al.
Published: (2010)
by: Suresh, malladi, et al.
Published: (2010)
A Study on the Factors That Influence the Consumers’ Trust on E-commerce Adoption
by: YiYi, Thaw, et al.
Published: (2009)
by: YiYi, Thaw, et al.
Published: (2009)
A Case Study of Linear Weightage Model for Supplier Selection Process
by: Ali, A.A., et al.
Published: (2008)
by: Ali, A.A., et al.
Published: (2008)
A comparison of Asian e-government websites
quality: using a non-parametric test
by: Dominic P, Dhanapal Durai, et al.
Published: (2010)
by: Dominic P, Dhanapal Durai, et al.
Published: (2010)
Prediction of zoonosis incidence in human using seasonal auto regressive integrated moving average (SARIMA).
by: Adhistya, Erna, et al.
Published: (2009)
by: Adhistya, Erna, et al.
Published: (2009)
Forecasting Method Selection Using ANOVA
and Duncan Multiple Range Tests on Time
Series Dataset
by: Adhistya, Erna, et al.
Published: (2010)
by: Adhistya, Erna, et al.
Published: (2010)
Decision Support Conceptual Framework
for Zoonosis Emerging System
by: Adhistya, Erna, et al.
Published: (2010)
by: Adhistya, Erna, et al.
Published: (2010)
Conceptual Information System Success Model for
Small and Medium Enterprise Clinic Information
System
by: Aliza, sarlan, et al.
Published: (2010)
by: Aliza, sarlan, et al.
Published: (2010)
Forecasting of Salmonellosis Incidence in Human using Artificial Neural Network
by: Adhistya Erna, Permanasari, et al.
Published: (2010)
by: Adhistya Erna, Permanasari, et al.
Published: (2010)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
Algorithm Design of Digital Watermarking Scheme for Multi-frames Medical Images
by: Khor, Hui Liang, et al.
Published: (2015)
by: Khor, Hui Liang, et al.
Published: (2015)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
A new efficient checkpointing algorithm for distributed mobile computing
by: Mansouri, Houssem, et al.
Published: (2015)
by: Mansouri, Houssem, et al.
Published: (2015)
Logico-linguistic semantic representation of documents
by: Wani, Sharyar, et al.
Published: (2016)
by: Wani, Sharyar, et al.
Published: (2016)
Efficient range free localization scheme for mobile wireless sensor networks / Ammar Moh’d Ammar Abuznaid
by: Ammar Moh’d, Ammar Abuznaid
Published: (2017)
by: Ammar Moh’d, Ammar Abuznaid
Published: (2017)
Automata representation for Abelian groups
by: Fong, Wan Heng, et al.
Published: (2013)
by: Fong, Wan Heng, et al.
Published: (2013)
Image matching using relational graph representation
by: Lai, Chui Yen
Published: (2005)
by: Lai, Chui Yen
Published: (2005)
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
by: Klaib, Ahmad Fadel, et al.
Published: (2007)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Similar Items
-
Cost estimation for the key representation auditing scheme
by: P.D.D., Dominic, et al.
Published: (2009) -
A new auditing scheme for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2008) -
A comparative representation approach to modern
heuristic search methods in a job shop
by: Dominic P, Dhanapal Durai, et al.
Published: (2008) -
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009) -
Quality evaluation of e-government website using web diagnostic tools: Asian case
by: Jati, H., et al.
Published: (2009)