Sciweavers

7839 search results - page 348 / 1568
» What's there and what's not
Sort
View
ESORICS
2009
Springer
15 years 5 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
DAWAK
2006
Springer
15 years 5 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
CIKM
1995
Springer
15 years 5 months ago
Using Speculation to Reduce Server Load and Service Time on the WWW
Speculative service implies that a client's request for a document is serviced by sending, in addition to the document requested, a number of other documents (or pointers the...
Azer Bestavros
VL
1995
IEEE
176views Visual Languages» more  VL 1995»
15 years 5 months ago
The Visual Language of Experts in Graphic Design
Graphic designers and other visual problem solving experts now routinely use computer-based imageediting tools in their work. Recently, attempts have been made to apply learning a...
Henry Lieberman
ESOP
2010
Springer
15 years 5 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers