Sciweavers

181 search results - page 17 / 37
» Analyzing Regulatory Rules for Privacy and Security Requirem...
Sort
View
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
15 years 7 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
CSFW
1998
IEEE
13 years 12 months ago
Data Level Inference Detection in Database Systems
Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the...
Raymond W. Yip, Karl N. Levitt
CSFW
2009
IEEE
14 years 2 months ago
A Method for Proving Observational Equivalence
—Formal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability pr...
Véronique Cortier, Stéphanie Delaune
CCS
2006
ACM
13 years 11 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
SAFECOMP
2000
Springer
13 years 11 months ago
Speeding-Up Fault Injection Campaigns in VHDL Models
Abstract. Simulation-based Fault Injection in VHDL descriptions is increasingly common due to the popularity of top-down design flows exploiting this language. This paper presents ...
B. Parrotta, Maurizio Rebaudengo, Matteo Sonza Reo...