Sciweavers

126 search results - page 4 / 26
» Information Theory and the Security of Binary Data Perturbat...
Sort
View
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 7 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
UTP
2010
13 years 5 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
PODS
2001
ACM
148views Database» more  PODS 2001»
14 years 7 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
IPPS
2006
IEEE
14 years 1 months ago
An entropy-based algorithm for time-driven software instrumentation in parallel systems
While monitoring, instrumented long running parallel applications generate huge amount of instrumentation data. Processing and storing this data incurs overhead, and perturbs the ...
A. Ozmen
ASPLOS
2004
ACM
14 years 28 days ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...