Sciweavers

1779 search results - page 61 / 356
» A Formal Model of Data Privacy
Sort
View
PODS
2010
ACM
184views Database» more  PODS 2010»
15 years 6 months ago
Universally optimal privacy mechanisms for minimax agents
A scheme that publishes aggregate information about sensitive data must resolve the trade-off between utility to information consumers and privacy of the database participants. D...
Mangesh Gupte, Mukund Sundararajan
PDCAT
2007
Springer
15 years 7 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
CSFW
2003
IEEE
15 years 6 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
FUIN
2008
101views more  FUIN 2008»
15 years 1 months ago
Translation of Intermediate Language to Timed Automata with Discrete Data
The aim of this work is to describe the translation from Intermediate Language, one of the input formalisms of the model checking platform VerICS, to timed automata with discrete d...
Agata Janowska, Pawel Janowski, Dobieslaw Wr&oacut...
ESORICS
2011
Springer
14 years 1 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...