• P3S

  • Referenced in 2 articles [sw27062]
  • protect the privacy of subscriber interest and confidentiality of published content. P3S combines recent advances...
  • SeLINQ

  • Referenced in 2 articles [sw28379]
  • application-database boundaries. The root cause for confidentiality and integrity attacks against computing systems...
  • Chaffinch

  • Referenced in 1 article [sw19155]
  • Chaffinch: Confidentiality in the face of legal threats. We present the design and rationale ... practical system for passing confidential messages. The mechanism is an adaptation of Rivest’s “chaffing...
  • Moat

  • Referenced in 1 article [sw23080]
  • Moat: Verifying Confidentiality of Enclave Programs. Security-critical applications constantly face threats from exploits ... introduce Moat, a tool which formally verifies confidentiality properties of applications running...
  • Volpano Smith

  • Referenced in 1 article [sw29543]
  • This property of a program is called confidentiality. For a simple while-language without threads ... correctness property, all potential breaks of confidentiality are discovered...
  • AttributeRiskCalculation

  • Referenced in 1 article [sw37727]
  • then be released in place of the confidential data. An important evaluation prior to synthetic ... referring to an intruder correctly inferring the confidential values of synthetic records, is one type...
  • AdJail

  • Referenced in 1 article [sw38010]
  • AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements. Web publishers frequently integrate ... This practice exposes sensitive page content to confidentiality and integrity attacks launched by advertisements...
  • MAWS

  • Referenced in 1 article [sw01354]
  • mobile agent can be secured against confidentiality and integrity attacks during transport and suggests ways...
  • CycurLIB

  • Referenced in 1 article [sw09831]
  • data or by encrypting data to ensure confidentiality. CycurLIB is highly configurable to the customer...
  • TAKOS

  • Referenced in 1 article [sw13696]
  • interest. Roughly speaking, ensuring opacity provides confidentiality of a secret on the system that must...
  • DNSCurve

  • Referenced in 1 article [sw22847]
  • drastically improve every dimension of DNS security: Confidentiality: DNS requests and responses today are completely...
  • PhishEye

  • Referenced in 1 article [sw23892]
  • that deceives unaware users into disclosing their confidential information. While significant effort has been devoted...
  • W3Bcrypt

  • Referenced in 1 article [sw30069]
  • these trust models to protect the confidentiality and integrity of the data against snooping...
  • VMGuard

  • Referenced in 1 article [sw31765]
  • trust the cloud providers to protect the confidentiality and integrity of their applications and data...
  • Chiron

  • Referenced in 1 article [sw32566]
  • dual goals of data privacy and model confidentiality. Chiron runs the standard ML training toolchain...
  • G-Confid

  • Referenced in 1 article [sw34043]
  • generalized system which prevents the release of confidential information in tabular data using the method...
  • tsBNgen

  • Referenced in 1 article [sw35076]
  • world data, due to its nature, is confidential and cannot be shared. Bayesian networks...
  • PixelVault

  • Referenced in 1 article [sw37377]
  • GPUs for Securing Cryptographic Operations. Protecting the confidentiality of cryptographic keys in the event...
  • Mashic

  • Referenced in 1 article [sw38006]
  • presence of benign gadgets, that satisfy confidentiality and integrity constrains with regard to the integrator...
  • CONVERT

  • Referenced in 0 articles [sw21976]
  • instance into a scalar model where all confidential information has been removed or into formats ... following goals: Permit users to convert a confidential model into GAMS scalar format so that ... passed on to others for investigation without confidentiality being lost. A way of sharing GAMS...