Sciweavers

712 search results - page 118 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Roles of variables in object-oriented programming
Roles can be assigned to occurrences of variables in programs according to a small number of stereotypical patterns of use. Studies on explicitly teaching roles to novices learnin...
Pauli Byckling, Petri Gerdt, Jorma Sajaniemi
IFIP
2004
Springer
15 years 3 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
62
Voted
OOPSLA
2004
Springer
15 years 3 months ago
Bottleneck analysis in java applications using hardware performance monitors
This poster presents MonitorMethod which helps Java programmers gain insight in the behavior of their applications. MonitorMethod instruments the Java application and relates hard...
Dries Buytaert, Andy Georges, Lieven Eeckhout, Koe...
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 1 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
71
Voted
ICWSM
2008
14 years 11 months ago
Social Access Control for Social Media Using Shared Knowledge Questions
Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as "what is our scho...
Michael Toomim, Xianhang Zhang, James Fogarty, Nat...