Sciweavers

2259 search results - page 8 / 452
» Separation and information hiding
Sort
View
SIGSOFT
2005
ACM
16 years 12 days ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...
ASPLOS
2004
ACM
15 years 5 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
79
Voted
IH
1998
Springer
15 years 3 months ago
Reliable Blind Information Hiding for Images
Lisa M. Marvel, Charles G. Boncelet Jr., Charles T...
MDM
2007
Springer
123views Communications» more  MDM 2007»
15 years 5 months ago
Hiding Location Information from Location-Based Services
—In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized e...
Urs Hengartner
85
Voted
COMAD
2008
15 years 1 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang