Sciweavers

5 search results - page 1 / 1
» Policy Transformations for Preventing Leakage of Sensitive I...
Sort
View
DBSEC
2006
73views Database» more  DBSEC 2006»
13 years 7 months ago
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
Saket Kaushik, William H. Winsborough, Duminda Wij...
CCS
2005
ACM
13 years 11 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 7 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
NSDI
2010
13 years 7 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
ICSE
2005
IEEE-ACM
14 years 5 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...