• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 507
Next 10 →

Calibrating noise to sensitivity in private data analysis

by Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, Adam Smith - In Proceedings of the 3rd Theory of Cryptography Conference , 2006
"... Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the datab ..."
Abstract - Cited by 649 (60 self) - Add to MetaCart
Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f

Information flow control for standard OS abstractions

by Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M. Frans Kaashoek , Eddie Kohler , Robert Morris - IN SOSP , 2007
"... Decentralized Information Flow Control (DIFC) [24] is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted securit ..."
Abstract - Cited by 189 (11 self) - Add to MetaCart
Decentralized Information Flow Control (DIFC) [24] is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted

Preventing Attribute Information Leakage in Automated Trust Negotiation

by Keith Irwin, Ting Yu - In Proceedings of the 12th ACM Conference on Computer and Communications Security , 2005
"... Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are protected by access control policies which may also be communicated to the other party. Ideally, sensitive information sh ..."
Abstract - Cited by 30 (0 self) - Add to MetaCart
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are protected by access control policies which may also be communicated to the other party. Ideally, sensitive information

Persona: An Online Social Network with User-Defined Privacy

by Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, Daniel Starin
"... Online social networks (OSNs) are immensely popular, with some claiming over 200 million users [10]. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits fr ..."
Abstract - Cited by 145 (4 self) - Add to MetaCart
Online social networks (OSNs) are immensely popular, with some claiming over 200 million users [10]. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits

Information Leakage Prevention Using

by Tarek S. Sobh
"... Abstract — The worst news for information technology people are computer has been stolen or lost. The actual problem is the loss of the data stored on the hard drive that can fall into the wrong hands. However, users of information system and laptops computers are facing real problems with due to in ..."
Abstract - Add to MetaCart
to intruders using attack techniques when they are connected to the network and lost or stolen computers. In order to protect your organization against information leakage you should encrypt this data by only allowing the user with access to the encryption key to view the data, authorized application usage

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

by Bugra Gedik, Ling Liu - IEEE TRANSACTIONS ON MOBILE COMPUTING , 2008
"... Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of l ..."
Abstract - Cited by 118 (5 self) - Add to MetaCart
of location-based services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from

Private queries in location based services: anonymizers are not necessary

by Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, Kian-lee Tan - In SIGMOD , 2008
"... Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must not be disclosed. Existing solutions utilize a trusted anonymizer between the users and the LBS. This approach has several ..."
Abstract - Cited by 133 (16 self) - Add to MetaCart
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must not be disclosed. Existing solutions utilize a trusted anonymizer between the users and the LBS. This approach has

Sharing but Protecting Content Against Internal Leakage for Organisations

by Muntaha Alawneh, Imad M. Abbadi
"... Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who have such privileges and know from where to obtain corporate sensitive information, are far more dangerous than outsiders. ..."
Abstract - Add to MetaCart
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who have such privileges and know from where to obtain corporate sensitive information, are far more dangerous than outsiders

From trusted to secure: Building and executing applications that enforce system security

by Boniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Mcdaniel - USENIX ANNUAL TECHNICAL CONFERENCE , 2007
"... Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections rely on restricting the flow of information between processes based on security levels. The problem is, there are many ap ..."
Abstract - Cited by 29 (11 self) - Add to MetaCart
applications that defy simple classification by security level, some of them essential for system operation. Surprisingly, the common practice among these operating systems is simply to mark these applications as “trusted”, and thus allow them to bypass label protections. This compromise is not a limitation

Protecting Circuits from Computationally-Bounded Leakage

by Sebastian Faust, Leonid Reyzin, Eran Tromer , 2009
"... Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles any circuit into a device that maintains secrecy even in the presence of well-defined classes of side-channel leakage. Our ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles any circuit into a device that maintains secrecy even in the presence of well-defined classes of side-channel leakage
Next 10 →
Results 1 - 10 of 507
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University