Sciweavers

95 search results - page 9 / 19
» The Complexity of Synchronous Notions of Information Flow Se...
Sort
View
SACMAT
2005
ACM
14 years 2 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
IJISEC
2008
119views more  IJISEC 2008»
13 years 8 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
ISW
1997
Springer
14 years 26 days ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
14 years 14 days ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
APVIS
2011
12 years 8 months ago
View point evaluation and streamline filtering for flow visualization
Visualization of flow fields with geometric primitives is often challenging due to occlusion that is inevitably introduced by 3D streamlines. In this paper, we present a novel v...
Teng-Yok Lee, Oleg Mishchenko, Han-Wei Shen, Roger...