Sciweavers

2272 search results - page 199 / 455
» Provable Data Privacy
Sort
View
122
Voted
ACSAC
2009
IEEE
15 years 7 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
116
Voted
SDMW
2009
Springer
15 years 7 months ago
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
Abstract. Database provenance chronicles the history of updates and modifications to data, and has received much attention due to its central role in scientific data management. ...
Jing Zhang, Adriane Chapman, Kristen LeFevre
96
Voted
SP
2007
IEEE
15 years 7 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
72
Voted
BIOSURVEILLANCE
2007
Springer
15 years 7 months ago
A Study into Detection of Bio-Events in Multiple Streams of Surveillance Data
Abstract. This paper reviews the results of a study into combining evidence from multiple streams of surveillance data in order to improve timeliness and specificity of detection ...
Josep Roure, Artur Dubrawski, Jeff Schneider
CSFW
2009
IEEE
15 years 4 months ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers