Sciweavers

8701 search results - page 59 / 1741
» Protecting information on the Web
Sort
View
91
Voted
USS
2004
15 years 2 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ISSA
2004
15 years 2 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa
TKDE
2008
122views more  TKDE 2008»
15 years 18 days ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
132
Voted
EJC
2009
14 years 10 months ago
A New Partial Information Extraction Method for Personal Mashup Construction
Nowadays more and more Web sites generate Web pages containing client-side scripts such as JavaScript and Flash instead of ordinary static HTML pages. These scripts create dynamic ...
Junxia Guo, Hao Han, Takehiro Tokuda
98
Voted
TGC
2007
Springer
15 years 6 months ago
Formal Approaches to Information-Hiding (Tutorial)
Abstract. In this survey paper we consider the class of protocols for informationhiding which use randomization to obfuscate the link between the observables and the information to...
Romain Beauxis, Konstantinos Chatzikokolakis, Catu...