Sciweavers

776 search results - page 114 / 156
» Securing user inputs for the web
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
Sanitization's slippery slope: the design and study of a text revision assistant
For privacy reasons, sensitive content may be revised before it is released. The revision often consists of redaction, that is, the “blacking out” of sensitive words and phras...
Richard Chow, Ian Oberst, Jessica Staddon
VRST
2005
ACM
14 years 2 months ago
Dynamic creation of interactive mixed reality presentations
In this paper, we describe a method of dynamic creation of interactive presentations for Mixed Reality environments. The presentations are created automatically for collections of...
Krzysztof Walczak, Rafal Wojciechowski
CCS
2009
ACM
14 years 3 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
PLDI
2006
ACM
14 years 2 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
SOUPS
2009
ACM
14 years 3 months ago
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing
A recent trend in social networking, photo/video sharing, and location-sharing services is a demand for more expressive privacy mechanisms that provide greater control over the co...
Michael Benisch, Patrick Gage Kelley, Norman M. Sa...