Sciweavers

8701 search results - page 59 / 1741
» Protecting information on the Web
Sort
View
USS
2004
13 years 11 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ISSA
2004
13 years 11 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa
TKDE
2008
122views more  TKDE 2008»
13 years 9 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
EJC
2009
13 years 7 months ago
A New Partial Information Extraction Method for Personal Mashup Construction
Nowadays more and more Web sites generate Web pages containing client-side scripts such as JavaScript and Flash instead of ordinary static HTML pages. These scripts create dynamic ...
Junxia Guo, Hao Han, Takehiro Tokuda
TGC
2007
Springer
14 years 4 months ago
Formal Approaches to Information-Hiding (Tutorial)
Abstract. In this survey paper we consider the class of protocols for informationhiding which use randomization to obfuscate the link between the observables and the information to...
Romain Beauxis, Konstantinos Chatzikokolakis, Catu...