Sciweavers

5255 search results - page 326 / 1051
» Formal Methods for Privacy
Sort
View
OOPSLA
1995
Springer
15 years 8 months ago
Bidirectional Object Layout for Separate Compilation
Existing schemes for object layout and dispatch in the presence of multiple inheritance and separate compilation waste space and are slower than systems with single inheritance. T...
Andrew C. Myers
SP
2002
IEEE
114views Security Privacy» more  SP 2002»
15 years 4 months ago
HMM-based techniques for speech segments extraction
The goal of the speech segments extraction process is to separate acoustic events of interest (the speech segment to be recognised) in a continuously recorded signal from other par...
Waleed H. Abdulla
CCS
2010
ACM
15 years 2 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
ICDE
2009
IEEE
176views Database» more  ICDE 2009»
16 years 6 months ago
Efficient Table Anonymization for Aggregate Query Answering
Abstract-- Privacy protection is a major concern when microdata needs to be released for ad hoc analyses. This has led to a lot of recent research in privacy goals and table anonym...
Cecilia M. Procopiuc, Divesh Srivastava
ACMSE
2005
ACM
15 years 10 months ago
Token-based dynamic trust establishment for web services
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
Zhengping Wu, Alfred C. Weaver