نتایج جستجو برای: data sanitization
تعداد نتایج: 2410486 فیلتر نتایج به سال:
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a historical record of the past that can also pose a serious threat to privacy. Policies which limit data retention conflict with the goal of accurate auditing, and data owners have to carefully balance the need for policy co...
There have been a number of steganography embedding techniques proposed over the past few years. In turn, there has been great interest in steganalysis techniques as the embedding techniques improve. Specifically, universal steganalysis techniques have become more attractive since they work independently of the embedding technique. In this work, we examine the effectiveness of a basic universal...
The primary defense against cross site scripting attacks in web applications is the use of sanitization, the practice of filtering untrusted inputs. We analyze sanitizer use in a shipping web application with over 400,00 lines of code, one of the largest applications studied to date. Our analysis reveals two novel problems: inconsistent sanitization and inconsistent multiple sanitization. We fo...
Data security in cloud services is achieved by imposing a broad range of privacy settings and restrictions. However, the different techniques used fail to eliminate hazard serious data leakage, information loss other vulnerabilities. Therefore, better policy requirements are necessary ensure acceptable protection levels cloud. The two procedures presented this paper intended build new method. H...
In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal privacy, and rashly publishing trajectory data set will cause serious privacy leakage risk. At present, the privacy protection of trajectory dat...
We initiate the study of sanitizable signatures over encrypted data. While previous solutions for sanitizable signatures require the sanitizer to know, in clear, the original message-signature pair in order to generate the new signature, we investigate the case where these data should be hidden from the sanitizer and how this can be achieved with encryption. We call this primitive sanitizable s...
Online Social Networks offer for social interactions and information sharing among peoples, but it includes security and privacy issues. OSNs allow users to limit access to shared data; OSNs currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. To overcome this, we put forward an approach which supports the protection of shared data associa...
An effective monitoring of microbial contamination on surfaces and plant components is of fundamental importance in food industry, refectories and work canteens to ensure products quality and safety. The classic microbiological tests inform about the sanitization procedures effectiveness at least after 1-2 days, the rapid luminescent ATP assay after about 5 minutes, on site. In this study the p...
High-Utility Itemset Mining (HUIM) is an extension of frequent itemset mining, which discovers itemsets yielding a high profit in transaction databases (HUIs). In recent years, a major issue that has arisen is that data publicly published or shared by organizations may lead to privacy threats since sensitive or confidential informationmay be uncovered by data mining techniques. To address this ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید