Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Speculative service implies that a client's request for a document is serviced by sending, in addition to the document requested, a number of other documents (or pointers the...
Graphic designers and other visual problem solving experts now routinely use computer-based imageediting tools in their work. Recently, attempts have been made to apply learning a...
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...