Sciweavers

2272 search results - page 223 / 455
» Provable Data Privacy
Sort
View
121
Voted
CSFW
2003
IEEE
15 years 6 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
98
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
116
Voted
AGENTS
1999
Springer
15 years 5 months ago
Learning to Remove Internet Advertisements
This paper discusses improving the methodology introduced in Kushmerick’s paper about learning to remove internet advertisements. The aim is to reduce the model build time as we...
Nicholas Kushmerick
ESORICS
1998
Springer
15 years 5 months ago
Side Channel Cryptanalysis of Product Ciphers
Building on the work of Kocher[Koc96], Jaffe, and Yun [KJY98], we discuss the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion o...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
AGENTS
1997
Springer
15 years 5 months ago
Real-Time Control of Attention and Behavior in a Logical Framework
We describe a uniform technique for representing both sensory data and the attentional state of an agent using a subset of modal logic with indexicals. The resulting representatio...
Ian Horswill