Sciweavers

330 search results - page 4 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 1 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
NSPW
2006
ACM
15 years 3 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
WPES
2004
ACM
15 years 3 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
ICDCS
2008
IEEE
15 years 4 months ago
Controlled Information Sharing in Collaborative Distributed Query Processing
We present a simple, yet powerful, approach for the specification and enforcement of authorizations regulating data release among data holders collaborating in a distributed comp...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
NDSS
2008
IEEE
15 years 4 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters