Sciweavers

2386 search results - page 263 / 478
» Database Security 2000
Sort
View
CADE
2000
Springer
15 years 7 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel
123
Voted
PDSE
2000
91views more  PDSE 2000»
15 years 4 months ago
A Formalism for Hierarchical Mobile Agents
This paper presents a theoretical and practical framework for constructing and reasoning about mobile agents. The framework is formulated as a process calculus and has two contrib...
Ichiro Satoh
CAD
2000
Springer
15 years 3 months ago
Lessons learned developing protocols for the industrial virtual enterprise
The protocols selected and developed by the NIIIP Consortium have been validated in three end-of-cycle demonstrations. In each cycle, a team with expertise in technical product da...
Martin Hardwick, K. C. Morris, David L. Spooner, T...
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
16 years 3 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 3 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...