Sciweavers

82 search results - page 5 / 17
» sp 2008
Sort
View
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
13 years 9 months ago
Expressive Declassification Policies and Modular Static Enforcement
This paper provides a way to specify expressive declassification policies, in particular, when, what, and where policies that include conditions under which downgrading is allowed...
Anindya Banerjee, David A. Naumann, Stan Rosenberg
CORR
2008
Springer
69views Education» more  CORR 2008»
13 years 10 months ago
TellTable Spreadsheet Audit: from Technical Possibility to Operating Prototype
At the 2003 EuSpRIG meeting, we presented a framework and software infrastructure to generate and analyse an audit trail for a spreadsheet file. This report describes the results ...
John C. Nash, Andy Adler, Neil Smith
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 4 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 4 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
14 years 4 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov