Sciweavers

1795 search results - page 166 / 359
» Security Models and Information Flow
Sort
View
TKDE
2008
122views more  TKDE 2008»
15 years 4 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
IEEEIAS
2007
IEEE
15 years 10 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
CCS
2004
ACM
15 years 9 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
137
Voted
ICML
2010
IEEE
15 years 2 months ago
Online Prediction with Privacy
In this paper, we consider online prediction from expert advice in a situation where each expert observes its own loss at each time while the loss cannot be disclosed to others fo...
Jun Sakuma, Hiromi Arai
CVPR
2009
IEEE
16 years 1 months ago
Motion pattern interpretation and detection for tracking moving vehicles in airborne video
Detection and tracking of moving vehicles in airborne videos is a challenging problem. Many approaches have been proposed to improve motion segmentation on frameby-frame and pixel...
Gérard G. Medioni, Qian Yu