Sciweavers

TISSEC
2010
91views more  TISSEC 2010»
13 years 3 months ago
Combining fragmentation and encryption to protect privacy in data storage
Valentina Ciriani, Sabrina De Capitani di Vimercat...
TISSEC
2010
121views more  TISSEC 2010»
13 years 3 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
TISSEC
2010
109views more  TISSEC 2010»
13 years 3 months ago
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
Prithvi Bisht, Parthasarathy Madhusudan, V. N. Ven...
TISSEC
2010
72views more  TISSEC 2010»
13 years 3 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...