Sciweavers

331 search results - page 7 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
SIGOPS
2008
95views more  SIGOPS 2008»
14 years 9 months ago
Virtual machine time travel using continuous data protection and checkpointing
Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve vi...
Paula Ta-Shma, Guy Laden, Muli Ben-Yehuda, Michael...
CSFW
2011
IEEE
13 years 9 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
CCGRID
2005
IEEE
15 years 3 months ago
Version vector protocols implementing session guarantees
This paper analyses different protocols of session guarantees. Session guarantees (also known as client-centric consistency models) are one of the class of consistency models of r...
Anna Kobusinska, Cezary Sobaniec, Marek Libuda, Da...
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 1 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
PODS
2005
ACM
96views Database» more  PODS 2005»
15 years 9 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright