Sciweavers

1779 search results - page 70 / 356
» A Formal Model of Data Privacy
Sort
View
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
15 years 3 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu
ASWEC
2006
IEEE
15 years 7 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
ACSAC
2002
IEEE
15 years 6 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
116
Voted
EUC
2008
Springer
15 years 3 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
SAFECOMP
1998
Springer
15 years 5 months ago
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring safety properties such as timeliness in safety critical systems. We introduce the OASIS model and its associated techniques ...
Vincent David, Jean Delcoigne, Evelyne Leret, Alai...