Sciweavers

5255 search results - page 306 / 1051
» Formal Methods for Privacy
Sort
View
IFM
2010
Springer
204views Formal Methods» more  IFM 2010»
15 years 3 months ago
Collaborative Modelling and Co-simulation in the Development of Dependable Embedded Systems
This paper presents initial results of research aimed at developing methods and tools for multidisciplinary collaborative development of dependable embedded systems. We focus on th...
John S. Fitzgerald, Peter Gorm Larsen, Ken Pierce,...
NFM
2011
264views Formal Methods» more  NFM 2011»
14 years 11 months ago
Applying Atomicity and Model Decomposition to a Space Craft System in Event-B
Abstract. Event-B is a formal method for modeling and verifying consistency of systems. In formal methods such as Event-B, refinement is the process of enriching or modifying an a...
Asieh Salehi Fathabadi, Abdolbaghi Rezazadeh, Mich...
SODA
2010
ACM
164views Algorithms» more  SODA 2010»
16 years 2 months ago
Differentially Private Approximation Algorithms
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...
PROVSEC
2009
Springer
15 years 11 months ago
Self-enforcing Private Inference Control
Private inference control enables simultaneous enforcement of inference control and protection of users’ query privacy. Private inference control is a useful tool for database ap...
Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zho...
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 11 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...