Sciweavers

18 search results - page 3 / 4
» InstantDB: Enforcing Timely Degradation of Sensitive Data
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 8 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
COMCOM
2008
84views more  COMCOM 2008»
13 years 5 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse
ISI
2004
Springer
13 years 11 months ago
SECRETS: A Secure Real-Time Multimedia Surveillance System
We propose a surveillance framework (SECRETS: SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and ...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
13 years 11 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
PET
2004
Springer
13 years 11 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny