Sciweavers

2259 search results - page 8 / 452
» Separation and information hiding
Sort
View
SIGSOFT
2005
ACM
14 years 8 months ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...
ASPLOS
2004
ACM
14 years 27 days ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
IH
1998
Springer
13 years 11 months ago
Reliable Blind Information Hiding for Images
Lisa M. Marvel, Charles G. Boncelet Jr., Charles T...
MDM
2007
Springer
123views Communications» more  MDM 2007»
14 years 1 months ago
Hiding Location Information from Location-Based Services
—In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized e...
Urs Hengartner
COMAD
2008
13 years 9 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang