Sciweavers

1906 search results - page 152 / 382
» Data Privacy
Sort
View
EDBT
2009
ACM
90views Database» more  EDBT 2009»
15 years 10 months ago
Privacy-preserving data mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers ...
Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patr...
147
Voted
CSFW
2011
IEEE
14 years 3 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
ESORICS
2009
Springer
16 years 4 months ago
Data Structures with Unpredictable Timing
Abstract. A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an ...
Darrell Bethea, Michael K. Reiter
219
Voted
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
16 years 3 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
SOUPS
2010
ACM
15 years 7 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...