Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Hua DengQianhong WuBo QinSherman S. M. ChowJosep Domingo-FerrerWenchang ShiPublished in: AsiaCCS (2014)
Keyphrases
- data sets
- statistical analysis
- image data
- original data
- data processing
- data sources
- decision trees
- data collection
- sensitive information
- knowledge discovery
- database
- raw data
- synthetic data
- computer systems
- historical data
- data objects
- neural network
- experimental data
- sensor data
- machine learning
- data structure
- probability distribution
- training data
- data model
- relational databases