Sciweavers

1779 search results - page 101 / 356
» A Formal Model of Data Privacy
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
FORTE
2011
14 years 7 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
COMPENG
2010
265views Algorithms» more  COMPENG 2010»
15 years 8 months ago
Ontological Framework to Model Critical Infrastructures and their Interdependencies
This paper presents a Knowledge Base System (KBS) as a key component of a federated simulation framework which allows the investigation of (inter)dependencies among Critical Infra...
Elisa Castorini, Paolo Palazzari, Alberto Tofani, ...
ECOOP
1998
Springer
15 years 8 months ago
Extending the ODMG Object Model with Time
Although many temporal extensions of the relational data model have been proposed, there is no comparable amount of work in the context of object-oriented data models. Moreover, ex...
Elisa Bertino, Elena Ferrari, Giovanna Guerrini, I...
PERCOM
2010
ACM
15 years 2 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han