Sciweavers

2272 search results - page 187 / 455
» Provable Data Privacy
Sort
View
SOFSEM
2007
Springer
14 years 4 months ago
Multimedia Retrieval Algorithmics
Abstract. After text retrieval, the next waves in web searching and multimedia retrieval are the search for and delivery of images, music, video, and 3D scenes. Not only the percep...
Remco C. Veltkamp
CONCUR
2004
Springer
14 years 4 months ago
A Semantics for Concurrent Separation Logic
We present a trace semantics for a language of parallel programs which share access to mutable data. We introduce a resource-sensitive logic for partial correctness, based on a re...
Stephen D. Brookes
JCS
2006
118views more  JCS 2006»
13 years 10 months ago
Enforcing Robust Declassification and Qualified Robustness
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems release sensitive information as part of their in...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
IACR
2011
122views more  IACR 2011»
12 years 10 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
JAMIA
2010
131views more  JAMIA 2010»
13 years 5 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...