Sciweavers

1779 search results - page 22 / 356
» A Formal Model of Data Privacy
Sort
View
124
Voted
ICCAD
2006
IEEE
108views Hardware» more  ICCAD 2006»
16 years 17 days ago
Formal model of data reuse analysis for hierarchical memory organizations
– In real-time data-dominated communication and multimedia processing applications, due to the manipulation of large sets of data, a multi-layer memory hierarchy is used to enhan...
Ilie I. Luican, Hongwei Zhu, Florin Balasa
118
Voted
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 10 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
149
Voted
CCS
2005
ACM
15 years 9 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
213
Voted
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 3 months ago
Privacy Preserving OLAP
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas