Sciweavers

5255 search results - page 117 / 1051
» Formal Methods for Privacy
Sort
View
FMCO
2006
Springer
103views Formal Methods» more  FMCO 2006»
15 years 6 months ago
Verifying Object-Oriented Programs with KeY: A Tutorial
This paper is a tutorial on performing formal specification and semi-automatic verification of Java programs with the formal software development tool KeY. This tutorial aims to fi...
Wolfgang Ahrendt, Bernhard Beckert, Reiner Hä...
114
Voted
OOPSLA
2010
Springer
15 years 29 days ago
Random testing for higher-order, stateful programs
Testing is among the most effective tools available for finding bugs. Still, we know of no automatic technique for generating test cases that expose bugs involving a combination ...
Casey Klein, Matthew Flatt, Robert Bruce Findler
85
Voted
PERCOM
2004
ACM
16 years 2 months ago
Mix Zones: User Privacy in Location-aware Services
Privacy of personal location information is becoming an increasingly important issue. This paper refines a method, called the mix zone, developed to enhance user privacy in locati...
Alastair R. Beresford, Frank Stajano
SIGKDD
2002
93views more  SIGKDD 2002»
15 years 2 months ago
Randomization in Privacy-Preserving Data Mining
Suppose there are many clients, each having some personal information, and one server, which is interested only in aggregate, statistically significant, properties of this informa...
Alexandre V. Evfimievski
PSD
2004
Springer
94views Database» more  PSD 2004»
15 years 8 months ago
On the Security of Noise Addition for Privacy in Statistical Databases
Noise addition is a family of methods used in the protection of the privacy of individual data (microdata) in statistical databases. This paper is a critical analysis of the securi...
Josep Domingo-Ferrer, Francesc Sebé, Jordi ...