Sciweavers

16 search results - page 4 / 4
» On the Possibility of Provably Secure Obfuscating Programs
Sort
View
144
Voted
CCS
2011
ACM
14 years 3 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta