Sciweavers

10670 search results - page 100 / 2134
» Required Information Release
Sort
View
CCS
2008
ACM
15 years 3 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
127
Voted
IJSSE
2010
80views more  IJSSE 2010»
14 years 11 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
IACR
2011
87views more  IACR 2011»
14 years 1 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
ICDE
2006
IEEE
207views Database» more  ICDE 2006»
16 years 3 months ago
Automatic Sales Lead Generation from Web Data
Speed to market is critical to companies that are driven by sales in a competitive market. The earlier a potential customer can be approached in the decision making process of a p...
Ganesh Ramakrishnan, Sachindra Joshi, Sumit Negi, ...
SIGSOFT
2008
ACM
16 years 2 months ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su