122
click to vote
PET
15 years 5 months ago
2004 Springer
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
107
click to vote
PET
15 years 5 months ago
2004 Springer
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
94
Voted
PET
15 years 5 months ago
2004 Springer
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
PET
15 years 5 months ago
2004 Springer
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
111
Voted
PET
15 years 5 months ago
2004 Springer
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
|