A taxonomy of approaches to preserve location privacy in location-based services

A Khoshgozaran, C Shahabi - International Journal of …, 2010 - inderscienceonline.com
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a
dramatic increase in popularity of location-based services (LBS) tailored to users' locations …

Ensuring correctness, completeness, and freshness for outsourced tree-indexed data

TK Dang - Information Resources Management: Concepts …, 2010 - igi-global.com
In an outsourced database service model, query assurance takes an important role among
well-known security issues. To the best of our knowledge, however, none of the existing …

Database access pattern protection without full-shuffles

X Ding, Y Yang, RH Deng - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
Privacy protection is one of the fundamental security requirements for database outsourcing.
A major threat is information leakage from database access patterns generated by query …

Small, stupid, and scalable: secure computing with faerieplay

A Iliev, SW Smith - Proceedings of the fifth ACM workshop on Scalable …, 2010 - dl.acm.org
How can Agnes trust a computation C occurring at Boris's computer? In particular, how can
Agnes can trust that C is occurring without Boris even being able to observe its internal …

[PDF][PDF] Preserving access privacy over large databases

F Olumofin, I Goldberg - 2010 - Citeseer
Anonymity systems preserve the identities of users as they access Internet data sources. The
security of many such systems, such as Tor, relies on a model where the adversary does not …

A new hardware-assisted PIR with O(n) shuffle cost

X Ding, Y Yang, RH Deng, S Wang - International Journal of Information …, 2010 - Springer
Since the concept of private information retrieval (PIR) was first formalized by Chor et al.,
various constructions have been proposed with a common goal of reducing communication …

Reconstruction of falsified computer logs for digital forensics investigations

M Tang, C Fidge - Information Security 2010: Proceedings of the …, 2010 - eprints.qut.edu.au
Digital forensics investigations aim to find evidence that helps confirm or disprove a
hypothesis about an alleged computer-based crime. However, the ease with which …

Investigation on effectiveness of a prefabricated vertical drain during cyclic loading

B Indraratna, J Ni… - IOP Conference Series …, 2010 - iopscience.iop.org
The effectiveness of prefabricated vertical drains (PVDs) in enhancing the stability of soft
soils during cyclic loading was investigated using triaxial cyclic loading tests. Both …

Security issues in outsourced xml databases

TK Dang - IT Outsourcing: Concepts, Methodologies, Tools, and …, 2010 - igi-global.com
In an outsourced XML database service model, organizations rely upon the premises of
external service providers for the storage and retrieval management of their XML data …

Secure coprocessor-based private information retrieval without periodical preprocessing

P Wang, H Wang, J Pieprzyk - 2010 - ro.uow.edu.au
Abstract Early works on Private Information Retrieval (PIR) focused on minimizing the
necessary communication overhead. They seemed to achieve this goal but at the expense …