Sciweavers

5255 search results - page 102 / 1051
» Formal Methods for Privacy
Sort
View
CSFW
2010
IEEE
14 years 1 months ago
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs
We embed an operational semantics for security protocols in the interactive theorem prover Isabelle/HOL and derive two strong protocol-independent invariants. These invariants allo...
Simon Meier, Cas J. F. Cremers, David A. Basin
CVPR
2008
IEEE
15 years 7 days ago
Semi-supervised learning of multi-factor models for face de-identification
With the emergence of new applications centered around the sharing of image data, questions concerning the protection of the privacy of people visible in the scene arise. Recently...
Ralph Gross, Latanya Sweeney, Fernando De la Torre...
CCS
2000
ACM
14 years 2 months ago
Composition and integrity preservation of secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
Birgit Pfitzmann, Michael Waidner
DEXA
2005
Springer
93views Database» more  DEXA 2005»
14 years 3 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer
ICDE
2010
IEEE
182views Database» more  ICDE 2010»
14 years 10 months ago
Global Privacy Guarantee in Serial Data Publishing
While previous works on privacy-preserving serial data publishing consider the scenario where sensitive values may persist over multiple data releases, we find that no previous wor...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, K...