Sciweavers

2486 search results - page 86 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
CSFW
2005
IEEE
14 years 2 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
CCS
2010
ACM
14 years 4 days ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
HUC
2010
Springer
13 years 10 months ago
Convenience probe: a participatory sensing tool to collect large-scale consumer flow behaviors
This paper proposes Convenience Probe, a participatory sensing tool to collect large-scale consumer flow behaviors from everyday mobile phones. We hope to use Convenience Probe to...
Chuang-Wen You, Chih-Chiang Wei, Yu-Han Chen, Jya-...
CCS
2008
ACM
13 years 10 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
TIT
2008
84views more  TIT 2008»
13 years 8 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild