Sciweavers

6318 search results - page 133 / 1264
» Data Leakage Detection
Sort
View
ISW
2009
Springer
15 years 11 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 6 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
PLDI
2010
ACM
16 years 2 months ago
The Reachability-Bound Problem
We define the reachability-bound problem to be the problem of finding a symbolic worst-case bound on the number of times a given control location inside a procedure is visited in ...
Sumit Gulwani, Florian Zuleger
EUROSEC
2009
ACM
15 years 11 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
APNOMS
2009
Springer
15 years 11 months ago
Adaptive Coverage Adjustment for Femtocell Management in a Residential Scenario
Femtocell is an emerging technology for expanding cell coverage and increasing data rate, and its users deploy in their own premises by themselves. Therefore, femto base stations c...
Sam Yeoul Choi, Tae-Jin Lee, Min Young Chung, Hyun...