Sciweavers

1779 search results - page 22 / 356
» A Formal Model of Data Privacy
Sort
View
143
Voted
ICCAD
2006
IEEE
108views Hardware» more  ICCAD 2006»
16 years 2 months ago
Formal model of data reuse analysis for hierarchical memory organizations
– In real-time data-dominated communication and multimedia processing applications, due to the manipulation of large sets of data, a multi-layer memory hierarchy is used to enhan...
Ilie I. Luican, Hongwei Zhu, Florin Balasa
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
16 years 2 days ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
CCS
2005
ACM
15 years 11 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
233
Voted
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 5 months ago
Privacy Preserving OLAP
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas
122
Voted
ICECCS
2009
IEEE
116views Hardware» more  ICECCS 2009»
15 years 12 months ago
UML Modeling and Formal Verification of Control/Data Driven Embedded Systems
Fateh Boutekkouk, Mohamed Benmohammed