Sciweavers

1599 search results - page 35 / 320
» Program Analysis for Security and Privacy
Sort
View
CCS
2008
ACM
15 years 3 months ago
EON: modeling and analyzing dynamic access control systems with logic programs
We present EON, a logic-programming language and tool that can be used to model and analyze dynamic access control systems. Our language extends Datalog with some carefully design...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani...
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri
CCS
2003
ACM
15 years 7 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
WPES
2006
ACM
15 years 7 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
PSD
2004
Springer
94views Database» more  PSD 2004»
15 years 7 months ago
On the Security of Noise Addition for Privacy in Statistical Databases
Noise addition is a family of methods used in the protection of the privacy of individual data (microdata) in statistical databases. This paper is a critical analysis of the securi...
Josep Domingo-Ferrer, Francesc Sebé, Jordi ...