Sciweavers

113 search results - page 18 / 23
» Practical privacy: the SuLQ framework
Sort
View
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 2 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
CVPR
2008
IEEE
14 years 8 months ago
Semi-supervised learning of multi-factor models for face de-identification
With the emergence of new applications centered around the sharing of image data, questions concerning the protection of the privacy of people visible in the scene arise. Recently...
Ralph Gross, Latanya Sweeney, Fernando De la Torre...
ACSAC
2008
IEEE
14 years 1 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 29 days ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 8 days ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter