Sciweavers

5255 search results - page 134 / 1051
» Formal Methods for Privacy
Sort
View
TAP
2007
Springer
92views Hardware» more  TAP 2007»
15 years 9 months ago
Generating Unit Tests from Formal Proofs
We present a new automatic test generation method for JAVA CARD based on attempts at formal verification of the implementation under test (IUT). Self-contained unit tests in JUnit...
Christian Engel, Reiner Hähnle
114
Voted
FMCAD
2007
Springer
15 years 9 months ago
Formal Verification of Partial Good Self-Test Fencing Structures
— The concept of applying partial fencing to logic built-in self test (LBIST) hardware structures for the purpose of using partially good chips is well known in the chip design i...
Adrian E. Seigler, Gary A. Van Huben, Hari Mony
113
Voted
UM
2007
Springer
15 years 9 months ago
Respecting Users' Individual Privacy Constraints in Web Personalization
Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits may be severely counteracted by privacy constraints. Personaliz...
Yang Wang 0005, Alfred Kobsa
132
Voted
CSFW
2007
IEEE
15 years 9 months ago
Privacy and Utility in Business Processes
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
Adam Barth, John C. Mitchell, Anupam Datta, Sharad...
124
Voted
WWW
2010
ACM
15 years 8 months ago
Privacy in dynamic social networks
Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...