2,104 Hits in 3.0 sec

Compositional security and collateral leakage [article]

N. Bordenabe, A. McIver, C Morgan, T. Rabehaja
2016 arXiv   pre-print
leakage can be calculated and then bounded in its severity.  ...  By adapting a recent Hidden-Markov denotational model for non-interference security, so that it becomes "collateral aware", we give techniques and examples (e.g.public-key encryption) to show how collateral  ...  distributed ( §1.1), wrt collateral security Strict is less secure than Lax.  ... 
arXiv:1604.04983v1 fatcat:rv7hoo32cfaldeucjldu7wrwye

Reasoning About Distributed Secrets [chapter]

Nicolás Bordenabe, Annabelle McIver, Carroll Morgan, Tahiry Rabehaja
2017 Lecture Notes in Computer Science  
We provide methods to compute robust upper bounds on the impact of such information leakages with respect to all distributed secrets.  ...  In 1977 Tore Dalenius described how partial disclosure about one secret can impact the confidentiality of other correlated secrets, and indeed this phenomenon is well-known in privacy of databases.  ...  The collateral leakage resp. capacity of H wrt a prior Π: D(Z×X ) is the collateral leakage resp. capacity of ⇒ Π·chn.H.  ... 
doi:10.1007/978-3-319-60225-7_11 fatcat:4ycrkd37kbcpjd7oheeczi24l4

How Central Banks End Crises

Gary B. Gorton, Guillermo L. Ordooez
2014 Social Science Research Network  
Eric Rosengren, Geoffrey Tootell and seminar participants at the Boston Fed and Wharton for comments and suggestions.  ...  Re-creating confidence requires that the central bank lend in secret, hiding the identities of the borrowers, to prevent information about individual collateral from being produced and to create an information  ...  and the effort costs to prevent leakage are very low.  ... 
doi:10.2139/ssrn.2490449 fatcat:3xywnm56zrch3fzix2danfeu2e

Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC

Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
2021 Proceedings on Privacy Enhancing Technologies  
We thus construct non-interactive MPC protocols with strong security guarantees (full security, no residual leakage) in the short term.  ...  Over time, as the adversary can invest more and more computational resources, the security guarantee decays.  ...  Morgan Securities LLC.  ... 
doi:10.2478/popets-2021-0083 fatcat:254qdv2535aihjyr66m6qsyqom

A method for quantitative measuring the degree of damage by personal information leakage
개인 정보 노출에 대한 정량적 위험도 분석 방안

Pyong Kim, Younho Lee, Timur Khudaybergenov
2015 Journal of the Korea Institute of Information Security and Cryptology  
Keywords: personal information exposure, quantitative measure for the risk by personal information leakage, personal information security, security for SNS, security  ...  The proposed method considers the increase of the risk by the composition of the multiple items.  ...  personal information Composite -type personal information Attribute Internet account information (6) Table 5 . 5 Absolute privacy leakage level of composite-type personal information Composite  ... 
doi:10.13089/jkiisc.2015.25.2.395 fatcat:wkqt7qrqrba3fpvcsmm5atprlm

Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC [article]

Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, Eran Tromer
2021 IACR Cryptology ePrint Archive  
We thus construct non-interactive MPC protocols with strong security guarantees (full security, no residual leakage) in the short term.  ...  Over time, as the adversary can invest more and more computational resources, the security guarantee decays.  ...  Morgan Securities LLC.  ... 
dblp:journals/iacr/AlmashaqbehBHJM21 fatcat:duq7daq7mvepvm6p63kukmbdce

Diagnosis and Management of Lymphatic Disorders in Congenital Heart Disease

Benjamin Kelly, Sheyanth Mohanakumar, Vibeke Elisabeth Hjortdal
2020 Current Cardiology Reports  
Future research into pharmacological improvement of lymphatic function and continued implementation of lymphatic imaging and interventions may improve knowledge, treatment options, and outcome for affected  ...  prone to the development of lymphatic complications such as chylous and serous effusions, protein-losing enteropathy and plastic bronchitis.  ...  Dilated and multiple lymphatic collaterals. Leakage below to pleural cavity and leakage into airways resulting in cast production and plastic bronchitis in the case of inflammation.  ... 
doi:10.1007/s11886-020-01405-y pmid:33037935 fatcat:pj7impknqjhqvgtrtiuckgjike

I. Ophthalmoscopic and circulatory changes in focal retinal ischaemia

C T Dollery, P Henkind, J W Paterson, P S Ramalho, D W Hill
1966 British Journal of Ophthalmology  
Morag Engel, and Mr. L. Chennery, and the staff of the Experimental Surgical Unit, particularly Mr. J. Robson, Mr. M. Cussen, and Mr. D.  ...  Gwen Cox for looking after the records and typing the paper. This work was supported by grants from the Tobacco Research Council and the Medical Research Council.  ...  Thus, the blood filling the blocked arteriole is essentially of venous composition and this accounts for its dark colour.  ... 
doi:10.1136/bjo.50.6.285 pmid:5962535 pmcid:PMC506238 fatcat:ms6oc6udrjh5ralwfvpdmwpffi

How to keep a secret

Aggelos Kiayias, Qiang Tang
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
We formalize the notion of leakage-deterring in the context of encryption, signature, and identification and we provide efficient generic constructions that facilitate the recoverability of the hidden  ...  We introduce leakage-deterring public-key cryptographic primitives to address this problem.  ...  Using Bitcoin as collateral.  ... 
doi:10.1145/2508859.2516691 dblp:conf/ccs/KiayiasT13 fatcat:g5bellremjdrxdqo73gpnhu5wa

Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis

Xiangdong Cai
2015 International Journal of Security and Its Applications  
Experiments show that the method proposed can not only weaken the impact imposed on assessment result by false positive or false negative effectively, reveal security situation more deeply and accurately  ...  threats, and whose assessment results guide dynamic defense poorly.  ...  service data, reflecting the collateral damage caused by infringement of diffusion along dependency Conclusion From the aspect of security elements, the integration of decision-making, evaluation algorithms  ... 
doi:10.14257/ijsia.2015.9.3.30 fatcat:7cb6qfirhrcedgkcetipxdlgf4

D2.3 Multimodal Transport System_ System Modelling, Risk Analysis and Management, GDPR Compliance [article]

Christos Lyvas, Christos Kalloniatis, Kostas Maliatsos, Costas Lambrinoudakis, Athanasios Kanatas, Andreas Menegatos, Thrasyvoulos Giannakopoulos
2022 Zenodo  
methodology for it, and c) study and investigate the different categories of personal data that will be processed by the multimodal under the requirements.  ...  7 against the major Operators of Essential Services (OES) and the Digital Service Providers (DSP), b) model the multi-modal transportation ecosystem under the CitySCAPE context and propose a risk analysis  ...  As mentioned before, a secondary threat may be collateral consequence of the materialization of a primary threat.  ... 
doi:10.5281/zenodo.6866006 fatcat:w5pgiljfjzhnbeevjqqlfs4ow4

Collusion-Resistant Processing of SQL Range Predicates

Manish Kesarwani, Akshar Kaul, Gagandeep Singh, Prasad M. Deshpande, Jayant R. Haritsa
2018 Data Science and Engineering  
These segmented parts are then independently encrypted using a layered composition of a secure block cipher with the order-preserving encryption and prefix-preserving encryption schemes, and the resulting  ...  The security requirement in this environment is that data values from a plaintext domain of size N should not be leaked to within an interval of size H .  ...  Therefore, the goal of our scheme is not to completely prevent leakage; rather, we aim to minimize the leakage bandwidth, measured in terms of the number of queries required to breach the security constraint  ... 
doi:10.1007/s41019-018-0081-5 fatcat:oz2qhig3mnfida7njbp6w5pzsq

Additive and Multiplicative Notions of Leakage, and Their Capacities

Mario S. Alvim, Konstantinos Chatzikokolakis, Annabelle Mciver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith
2014 2014 IEEE 27th Computer Security Foundations Symposium  
known as g-leakage.  ...  It is complicated, and difficult to achieve, often because of unavoidable or even unpredictable operating conditions that can lead to breaches in planned security defences.  ...  [7] , [23] , so establishing the complete coincidence between composition refinement and the strong g-leakage pre-order.  ... 
doi:10.1109/csf.2014.29 dblp:conf/csfw/AlvimCMMPS14 fatcat:x2m4p4gidjb2dapfww7qo5b3im

Institutional Cash Pools and the Triffin Dilemma of the U.S. Banking System

Zoltan Pozsar
2013 Financial Markets, Institutions & Instruments  
Short-term government guaranteed securities are the next best choice, but their supply is insufficient. The shadow banking system arose to fill this vacuum.  ...  Explaining the rise of shadow banking from this angle paints a very different picture than the supply-side angle that views it as a story of banks' funding preferences and arbitrage.  ...  Securities Lenders' Cash Collateral Reinvestment Accounts' Composition .....................31 Figure 1 : 1 The Secular Rise of Institutional Cash Pools $ trillions Figure 2 : 2 The Average Size of  ... 
doi:10.1111/fmii.12013 fatcat:q6pgydruefaevkn5ddxplzuv74

Algebra for Quantitative Information Flow [chapter]

A. K. McIver, C. C. Morgan, T. Rabehaja
2017 Lecture Notes in Computer Science  
In other work we have studied a refines order for information flow in programs where the comparison defined by the order preserves both functional and confidentiality properties of secrets.  ...  We use our model to explore some algebraic properties of programs which contain secrets that can be updated, and which are valid in arbitrary contexts made up of possibly freshly declared secrets.  ...  The compositional refinement order for information flow appeared in [13] for security programs expressed in a simple programming language and in [1] for a channel model.  ... 
doi:10.1007/978-3-319-57418-9_1 fatcat:jp5lsptgsbgczowjsjkqv2tkcu
« Previous Showing results 1 — 15 out of 2,104 results