A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Compositional security and collateral leakage
[article]
2016
arXiv
pre-print
leakage can be calculated and then bounded in its severity. ...
By adapting a recent Hidden-Markov denotational model for non-interference security, so that it becomes "collateral aware", we give techniques and examples (e.g.public-key encryption) to show how collateral ...
distributed ( §1.1), wrt collateral security Strict is less secure than Lax. ...
arXiv:1604.04983v1
fatcat:rv7hoo32cfaldeucjldu7wrwye
Reasoning About Distributed Secrets
[chapter]
2017
Lecture Notes in Computer Science
We provide methods to compute robust upper bounds on the impact of such information leakages with respect to all distributed secrets. ...
In 1977 Tore Dalenius described how partial disclosure about one secret can impact the confidentiality of other correlated secrets, and indeed this phenomenon is well-known in privacy of databases. ...
The collateral leakage resp. capacity of H wrt a prior Π: D(Z×X ) is the collateral leakage resp. capacity of ⇒ Π·chn.H. ...
doi:10.1007/978-3-319-60225-7_11
fatcat:4ycrkd37kbcpjd7oheeczi24l4
How Central Banks End Crises
2014
Social Science Research Network
Eric Rosengren, Geoffrey Tootell and seminar participants at the Boston Fed and Wharton for comments and suggestions. ...
Re-creating confidence requires that the central bank lend in secret, hiding the identities of the borrowers, to prevent information about individual collateral from being produced and to create an information ...
and the effort costs to prevent leakage are very low. ...
doi:10.2139/ssrn.2490449
fatcat:3xywnm56zrch3fzix2danfeu2e
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
2021
Proceedings on Privacy Enhancing Technologies
We thus construct non-interactive MPC protocols with strong security guarantees (full security, no residual leakage) in the short term. ...
Over time, as the adversary can invest more and more computational resources, the security guarantee decays. ...
Morgan Securities LLC. ...
doi:10.2478/popets-2021-0083
fatcat:254qdv2535aihjyr66m6qsyqom
A method for quantitative measuring the degree of damage by personal information leakage
개인 정보 노출에 대한 정량적 위험도 분석 방안
2015
Journal of the Korea Institute of Information Security and Cryptology
개인 정보 노출에 대한 정량적 위험도 분석 방안
Keywords: personal information exposure, quantitative measure for the risk by personal information leakage, personal information security, security for SNS, security ...
The proposed method considers the increase of the risk by the composition of the multiple items. ...
personal information Composite
-type
personal
information
Attribute
Internet
account
information
(6)
Table 5 . 5 Absolute privacy leakage level of composite-type personal information Composite ...
doi:10.13089/jkiisc.2015.25.2.395
fatcat:wkqt7qrqrba3fpvcsmm5atprlm
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC
[article]
2021
IACR Cryptology ePrint Archive
We thus construct non-interactive MPC protocols with strong security guarantees (full security, no residual leakage) in the short term. ...
Over time, as the adversary can invest more and more computational resources, the security guarantee decays. ...
Morgan Securities LLC. ...
dblp:journals/iacr/AlmashaqbehBHJM21
fatcat:duq7daq7mvepvm6p63kukmbdce
Diagnosis and Management of Lymphatic Disorders in Congenital Heart Disease
2020
Current Cardiology Reports
Future research into pharmacological improvement of lymphatic function and continued implementation of lymphatic imaging and interventions may improve knowledge, treatment options, and outcome for affected ...
prone to the development of lymphatic complications such as chylous and serous effusions, protein-losing enteropathy and plastic bronchitis. ...
Dilated and multiple lymphatic collaterals. Leakage below to pleural cavity and leakage into airways resulting in cast production and plastic bronchitis in the case of inflammation. ...
doi:10.1007/s11886-020-01405-y
pmid:33037935
fatcat:pj7impknqjhqvgtrtiuckgjike
I. Ophthalmoscopic and circulatory changes in focal retinal ischaemia
1966
British Journal of Ophthalmology
Morag Engel, and Mr. L. Chennery, and the staff of the Experimental Surgical Unit, particularly Mr. J. Robson, Mr. M. Cussen, and Mr. D. ...
Gwen Cox for looking after the records and typing the paper. This work was supported by grants from the Tobacco Research Council and the Medical Research Council. ...
Thus, the blood filling the blocked arteriole is essentially of venous composition and this accounts for its dark colour. ...
doi:10.1136/bjo.50.6.285
pmid:5962535
pmcid:PMC506238
fatcat:ms6oc6udrjh5ralwfvpdmwpffi
How to keep a secret
2013
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
We formalize the notion of leakage-deterring in the context of encryption, signature, and identification and we provide efficient generic constructions that facilitate the recoverability of the hidden ...
We introduce leakage-deterring public-key cryptographic primitives to address this problem. ...
Using Bitcoin as collateral. ...
doi:10.1145/2508859.2516691
dblp:conf/ccs/KiayiasT13
fatcat:g5bellremjdrxdqo73gpnhu5wa
Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis
2015
International Journal of Security and Its Applications
Experiments show that the method proposed can not only weaken the impact imposed on assessment result by false positive or false negative effectively, reveal security situation more deeply and accurately ...
threats, and whose assessment results guide dynamic defense poorly. ...
service data, reflecting the collateral damage caused by infringement of diffusion along dependency
Conclusion From the aspect of security elements, the integration of decision-making, evaluation algorithms ...
doi:10.14257/ijsia.2015.9.3.30
fatcat:7cb6qfirhrcedgkcetipxdlgf4
D2.3 Multimodal Transport System_ System Modelling, Risk Analysis and Management, GDPR Compliance
[article]
2022
Zenodo
methodology for it, and c) study and investigate the different categories of personal data that will be processed by the multimodal under the requirements. ...
7 against the major Operators of Essential Services (OES) and the Digital Service Providers (DSP), b) model the multi-modal transportation ecosystem under the CitySCAPE context and propose a risk analysis ...
As mentioned before, a secondary threat may be collateral consequence of the materialization of a primary threat. ...
doi:10.5281/zenodo.6866006
fatcat:w5pgiljfjzhnbeevjqqlfs4ow4
Collusion-Resistant Processing of SQL Range Predicates
2018
Data Science and Engineering
These segmented parts are then independently encrypted using a layered composition of a secure block cipher with the order-preserving encryption and prefix-preserving encryption schemes, and the resulting ...
The security requirement in this environment is that data values from a plaintext domain of size N should not be leaked to within an interval of size H . ...
Therefore, the goal of our scheme is not to completely prevent leakage; rather, we aim to minimize the leakage bandwidth, measured in terms of the number of queries required to breach the security constraint ...
doi:10.1007/s41019-018-0081-5
fatcat:oz2qhig3mnfida7njbp6w5pzsq
Additive and Multiplicative Notions of Leakage, and Their Capacities
2014
2014 IEEE 27th Computer Security Foundations Symposium
known as g-leakage. ...
It is complicated, and difficult to achieve, often because of unavoidable or even unpredictable operating conditions that can lead to breaches in planned security defences. ...
[7] , [23] , so establishing the complete coincidence between composition refinement and the strong g-leakage pre-order. ...
doi:10.1109/csf.2014.29
dblp:conf/csfw/AlvimCMMPS14
fatcat:x2m4p4gidjb2dapfww7qo5b3im
Institutional Cash Pools and the Triffin Dilemma of the U.S. Banking System
2013
Financial Markets, Institutions & Instruments
Short-term government guaranteed securities are the next best choice, but their supply is insufficient. The shadow banking system arose to fill this vacuum. ...
Explaining the rise of shadow banking from this angle paints a very different picture than the supply-side angle that views it as a story of banks' funding preferences and arbitrage. ...
Securities Lenders' Cash Collateral Reinvestment Accounts' Composition .....................31
Figure 1 : 1 The Secular Rise of Institutional Cash Pools $ trillions
Figure 2 : 2 The Average Size of ...
doi:10.1111/fmii.12013
fatcat:q6pgydruefaevkn5ddxplzuv74
Algebra for Quantitative Information Flow
[chapter]
2017
Lecture Notes in Computer Science
In other work we have studied a refines order for information flow in programs where the comparison defined by the order preserves both functional and confidentiality properties of secrets. ...
We use our model to explore some algebraic properties of programs which contain secrets that can be updated, and which are valid in arbitrary contexts made up of possibly freshly declared secrets. ...
The compositional refinement order for information flow appeared in [13] for security programs expressed in a simple programming language and in [1] for a channel model. ...
doi:10.1007/978-3-319-57418-9_1
fatcat:jp5lsptgsbgczowjsjkqv2tkcu
« Previous
Showing results 1 — 15 out of 2,104 results