Sciweavers

1906 search results - page 188 / 382
» Data Privacy
Sort
View
153
Voted
CSFW
2004
IEEE
15 years 7 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
132
Voted
TRUST
2010
Springer
15 years 2 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte
141
Voted
OOPSLA
1999
Springer
15 years 8 months ago
The Generic Graph Component Library
In this paper we present the Generic Graph Component Library (GGCL), a generic programming framework for graph data structures and graph algorithms. Following the theme of the Sta...
Lie-Quan Lee, Jeremy G. Siek, Andrew Lumsdaine
133
Voted
AGENTS
2000
Springer
15 years 8 months ago
Adaptivity in agent-based routing for data networks
Adaptivity, both of the individual agents and of the interaction structure among the agents, seems indispensable for scaling up multi-agent systems MAS's in noisy environme...
David Wolpert, Sergey Kirshner, Christopher J. Mer...
138
Voted
SAFECOMP
1998
Springer
15 years 7 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel