Share This Author
Dynamic and Efficient Key Management for Access Hierarchies
The security of the scheme is based on pseudorandom functions, without reliance on the Random Oracle Model, and it is shown how to handle extensions proposed by Crampton  of the standard hierarchies to “limited depth” and reverse inheritance.
Internet Addiction: Metasynthesis of 1996-2006 Quantitative Research
- Sookeun Byun, Celestino Ruffini, Marina Blanton
- BusinessCyberpsychology Behav. Soc. Netw.
- 10 April 2009
The analysis showed that previous studies have utilized inconsistent criteria to define Internet addicts, applied recruiting methods that may cause serious sampling bias, and examined data using primarily exploratory rather than confirmatory data analysis techniques to investigate the degree of association rather than causal relationships among variables.
Internet addiction: Meta-synthesis of qualitative research for the decade 1996-2006
Secure multi-party computation problems and their applications: a review and open problems
A framework is developed to identify and define a number of new SMC problems for a spectrum of computation domains that include privacy-preserving database query, privacy- Preserving scientific computations, Privacy-Preserving intrusion detection,privacy-preserve statistical analysis, privacy -preserving geometric computation, and privacy- preserving data mining.
Disclosure limitation of sensitive rules
- M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, V. Verykios
- Computer ScienceProceedings Workshop on Knowledge and Data…
- 7 November 1999
This paper attempted to selectively hide some frequent itemsets from large databases with as little as possible impact on other non-sensitive frequent itemets.
Rights protection for relational data
- R. Sion, M. Atallah, S. Prabhakar
- Computer ScienceIEEE Transactions on Knowledge and Data…
- 9 June 2003
we introduce a solution for relational database content rights protection through watermarking. Rights protection for relational data is of ever-increasing interest, especially considering areas…
Algorithms and Theory of Computation Handbook
- M. Atallah
- Computer ScienceChapman & Hall/CRC Applied Algorithms and Data…
- 20 November 2009
This edition now covers external memory, parameterized, self-stabilizing, and pricing algorithms as well as the theories of algorithmic coding, privacy and anonymity, databases, computational games, and communication networks.
Privacy-preserving cooperative statistical analysis
- Wenliang Du, M. Atallah
- Computer ScienceSeventeenth Annual Computer Security Applications…
- 10 December 2001
Protocols for conducting the statistical analysis in such a cooperative environment based on a data perturbation technique and cryptography primitives are developed.
Private and Cheating-Free Outsourcing of Algebraic Computations
- David Benjamin, M. Atallah
- Mathematics, Computer ScienceSixth Annual Conference on Privacy, Security and…
- 1 October 2008
We give protocols for the secure and private outsourcing of linear algebra computations, that enable a client to securely outsource expensive algebraic computations (like the multiplication of huge…