Sciweavers

1779 search results - page 71 / 356
» A Formal Model of Data Privacy
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 5 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
ACSAC
2003
IEEE
15 years 5 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn
EIS
2011
253views ECommerce» more  EIS 2011»
14 years 8 months ago
A modelling and reasoning framework for social networks policies
Policy languages (such as privacy and rights) have had little impact on the wider community. Now that Social Networks have taken off, the need to revisit Policy languages and real...
Guido Governatori, Renato Iannella
ICCCN
2008
IEEE
15 years 8 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
IEEEARES
2008
IEEE
15 years 8 months ago
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy...
Esma Aïmeur, Gilles Brassard, José Man...