Sciweavers

TISSEC
2010
91views more  TISSEC 2010»
13 years 10 months ago
Combining fragmentation and encryption to protect privacy in data storage
Valentina Ciriani, Sabrina De Capitani di Vimercat...
TISSEC
2010
121views more  TISSEC 2010»
13 years 10 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
TISSEC
2010
109views more  TISSEC 2010»
13 years 10 months ago
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
Prithvi Bisht, Parthasarathy Madhusudan, V. N. Ven...
TISSEC
2010
72views more  TISSEC 2010»
13 years 10 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...