Sciweavers

208 search results - page 30 / 42
» Relations Among Privacy Notions
Sort
View
118
Voted
FLAIRS
2004
15 years 5 months ago
Typicality, Contextual Inferences and Object Determination Logic
We propose a rigorous definition of the notion of typicality, making use of the strict partial order naturally induced among the objects at hand by a given concept. This perspecti...
Michael Freund, Jean-Pierre Desclés, Anca P...
143
Voted
MST
2010
101views more  MST 2010»
15 years 2 months ago
Non-Uniform Reductions
Reductions and completeness notions form the heart of computational complexity theory. Recently non-uniform reductions have been naturally introduced in a variety of settings conc...
Harry Buhrman, Benjamin J. Hescott, Steven Homer, ...
161
Voted
CSFW
2009
IEEE
15 years 10 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
122
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
132
Voted
ESORICS
2008
Springer
15 years 5 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...