Sciweavers

367 search results - page 48 / 74
» The Return of the Sensitivity Attack
Sort
View
PVLDB
2010
117views more  PVLDB 2010»
13 years 6 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
DIMVA
2011
12 years 11 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
ICCV
2005
IEEE
14 years 9 months ago
Shapelets Correlated with Surface Normals Produce Surfaces
This paper addresses the problem of deducing the surface shape of an object given just the surface normals. Many shape measurement algorithms such as shape from shading and shape ...
Peter Kovesi
ICRA
2005
IEEE
151views Robotics» more  ICRA 2005»
14 years 1 months ago
Landmark Based Position Estimation for Pinpoint Landing on Mars
- Many of NASA's planned missions for the coming decade will require a pinpoint landing (PPL) capability, whether for sample acquisition and return or for precise insertion in...
Yang Cheng, Adnan Ansar
VLDB
2004
ACM
113views Database» more  VLDB 2004»
14 years 1 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...