72,840 Hits in 5.6 sec

Towards an Implementation of Information Flow Security Using Semantic Web Technologies

Oana Ureche, Robert Layton, Paul Watters
2012 2012 Third Cybercrime and Trustworthy Computing Workshop  
More information can be found at the Internet Commerce Security Laboratory website 1 .  ...  ACKNOWLEDGMENT This research was conducted at the Internet Commerce Security Laboratory and was funded by the State Government of Victoria, IBM, Westpac, the Australian Federal Police and the University  ...  To evaluate we will use popular web information systems written in several different programming languages (e.g. PHP, Perl, Python and Java).  ... 
doi:10.1109/ctc.2012.12 fatcat:hlpmtajejjc4hg6p5bk6di5lty

Privacy-preserving programming using sython

Michael Gaiman, Rahul Simha, Bhagirath Narahari
2007 Computers & security  
The main purpose of this paper is to explore the use of language syntax and underlying support for secure variables so that data owners can contract out programming tasks without worrying about information  ...  This paper focuses on the problem of providing developers with a programming language that incorporates privacy-preserving features.  ...  Such freedom to view or manipulate data is even celebrated in programming languages like C and in most early operating systems.  ... 
doi:10.1016/j.cose.2006.08.009 fatcat:c25yahssnrgttf5tvacw2hzdj4

Videoconferencing Software Options for Telemedicine: A Review for Movement Disorder Neurologists

Esther Cubo, Adrian Arnaiz-Rodriguez, Álvar Arnaiz-González, José Francisco Díez-Pastor, Meredith Spindler, Adriana Cardozo, Alvaro Garcia-Bustillo, Zoltan Mari, Bastiaan R. Bloem
2021 Frontiers in Neurology  
Overall technical and security information were found in 5/26 software (19.2%), including Microsoft Teams, Google Hangout, Coviu,, and Thera platforms.Conclusions: Detailed information about technical  ...  Technical capabilities and basic security features were determined for each videoconferencing software.Results: Twenty-six videoconferencing software programs were reviewed, 13 (50.0%) were specifically  ...  The features of the apps and their security and privacy details shown in the table are based on the available information on General features Specific features Security features App.  ... 
doi:10.3389/fneur.2021.745917 pmid:34707563 pmcid:PMC8542984 fatcat:i6xrhgvhtrenxbobz7myiifriq

Security and Privacy Functionalities in IoT

Elahe Fazeldehkordi, Olaf Owe, Josef Noll
2019 2019 17th International Conference on Privacy, Security and Trust (PST)  
Formal methods have come into wide use in the design and verification of safety, security, and privacy of systems in the industry, because they are very effective in verifying safety, security, and privacy  ...  Existing documents for security and privacy requirements and functionalities in IoT systems lack some of the security functionalities, and in particular, they do not focus on privacy issues or are presented  ...  Acknowledgements Acknowledgment This work has been supported by the research project IoTSec, Security in IoT for Smart Grids, with number 248113/O70 part of the IKTPLUSS program funded by the Research  ... 
doi:10.1109/pst47121.2019.8949054 dblp:conf/pst/FazeldehkordiON19 fatcat:x37vqxe35vdtdlo2xebg7beaoa

JCS special issue on EU-funded ICT research on Trust and Security

Jan Camenisch, Javier Lopez, Fabio Massacci, Massimo Ciscato, Thomas Skordas, Jan Camenisch, Javier Lopez, Fabio Massacci, Massimo Ciscato, Thomas Skordas
2010 Journal of Computer Security  
Acknowledgements The Editorial Committee members and the European Commission's DG INFSO Unit "Trust and Security" would like to warmly thank the reviewers for their skilful contributions to the selection  ...  With respect to the development of privacy-enhanced systems, such policy language might play a similar role to the one that high-level programming languages have played with respect to machine languages  ...  More precisely, a security state is embedded into the client program and code rewriting is used in order to ensure that such a state is queried and updated appropriately.  ... 
doi:10.3233/jcs-2010-0375 fatcat:knwllbbjyzfdtcde6yu2jny74y

DuetSGX: Differential Privacy with Secure Hardware [article]

Phillip Nguyen, Alex Silence, David Darais, Joseph P. Near
2020 arXiv   pre-print
Analysts submit queries written in the Duet language, which is specifically designed for verifying that programs satisfy differential privacy; DuetSGX uses the Duet typechecker to verify that each query  ...  We propose DuetSGX, a system that uses secure hardware (Intel's SGX) to eliminate the need for a trusted data curator.  ...  Duet [22] is a programming language for writing differentially private programs and verifying correct use of differential privacy.  ... 
arXiv:2010.10664v1 fatcat:ajqya5ppfnhb3jnue4z2o6jt3i

Block Chain Based Data Storage with Privacy and Authentication

Navaneetha Krishnan M, Vishnu A
2022 International Journal for Research in Applied Science and Engineering Technology  
In this set of program programs transmit the information collected to BS.  ...  Abstract— The project is entitled Block Chain Based Data Storage's privacy and ensures that blockchain-based framework integrated with authentication and privacy schemes are enhanced by secure connections  ...  To ensure that you can develop managed code that can be fully used by developers using any programming language, a set of language features and rules for using them called the Common Language Specification  ... 
doi:10.22214/ijraset.2022.43752 fatcat:6vi4v7kypzclxpbcolbl3rmmhu

Information Flow Control for Static Enforcement of User-Defined Privacy Policies

Soren Preibusch
2011 2011 IEEE International Symposium on Policies for Distributed Systems and Networks  
privacy and security policies [1].  ...  Basic concepts in information flow control In an imperative programming language, such as Java and JIF, which builds upon it, variables' values under information flow control are monitored to influence  ...  This project is part of research into a "Privacy Calculus", jointly supported by the British Council and the Deutscher Akademischer Austausch Dienst (ARC Project 1351).  ... 
doi:10.1109/policy.2011.23 dblp:conf/policy/Preibusch11 fatcat:pis3n2lnv5eevo2gf7h6mr7o2m

Teaching Secure Programming

M. Bishop, D.A. Frincke
2005 IEEE Security and Privacy  
Security features (such as bounds-checking for buffers) are built into languages such as Java, whereas C++ and others have no such features.  ...  The type-checking features in languages such as Modula 2 and Python reduce the chances of calling modules incorrectly.  ... 
doi:10.1109/msp.2005.133 fatcat:a2rva2mat5bnzjyohku3jxhumy

Trace oblivious computation

Chang Liu
2015 Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity - SPLASH Companion 2015  
I will study sequential and parallel programs and different channels, design languages and security type systems to support efficient algorithm implementations, while formally enforcing obliviousness.  ...  My study on the secure computation application shows that using our compiler, one PhD student can develop an oblivious algorithm in one day which took a research group of 5 researchers 4 months to develop  ...  Inspired by this observation, I adopt a programming language design and system co-designed approach to build a secure distributed computing system.  ... 
doi:10.1145/2814189.2814200 dblp:conf/oopsla/Liu15 fatcat:xny5l36slvcpledngq236eb3u4

Programming Languages and Systems Security

C. Skalka
2005 IEEE Security and Privacy  
Acknowledgments The author thanks Michael Hicks for his insights into languages and systems.  ...  Recognizing this, and recognizing security's importance in modern information systems, programming language researchers have made security a primary concern in language design and implementation.  ...  Recent language-based security research and development seeks to add security behaviors to language execution models and features for programming security policies to language syntax.  ... 
doi:10.1109/msp.2005.77 fatcat:obx3wzet5zgvfaicoxyfjw3uzi

Model-driven simulation for cross-domain policy enforcement

Zhengping Wu, Lifeng Wang
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
For privacy policies, we use XACML policy language to represent and build system model with a similar procedure described in section 6.1.  ...  , privacy configurations, and low-level system calls (services).  ...  Security policies for security flows are described in WS-SecurityPolicy and WS-Security formats, which are used for security protections of medical records and access control of other patient information  ... 
doi:10.4108/icst.trustcol.2010.5 dblp:conf/colcom/WuW10 fatcat:jyiiecdoafgdtdp4n4sfwq5u44

GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems

Orcun Oruc, Uwe Aßmann
2021 International Journal of Security Privacy and Trust Management  
In order for programming software agents, you need to handle analysis, design and implementation together; furthermore, privacy and trust should be integrated externally into the agent-oriented applications  ...  Current frameworks do not consider privacy, trust, and data integrity in agent applications.  ...  Uwe Aßmann, and Prof. Dr. Susanne Strahringer, for the patient guidance, encouragement, and comments they have provided to shape his doctoral vision.  ... 
doi:10.5121/ijsptm.2021.10201 fatcat:6muwbi746fadvfnvnaqavijmae

Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS

Mary TreesaThomas, Kanagaraj R., Lakshmi Vidyadharan
2015 International Journal of Computer Applications  
Data stored in the database includes personnel and sensitive data. Privacy policies in the database management system can control collection, access and disclosure of data.  ...  Policies are used to specify obligation. Obligation is certain actions or condition which has to be satisfied for accessing data.  ...  Earlier works does not have frameworks for developing privacy enforcement monitor which can be used in relational DBMSs with such features.  ... 
doi:10.5120/20003-1934 fatcat:wx6f76cv3ve6vlam4rkplyhc24

Enhancing Privacy Implementations of Database Enquiries

Florian Kammüller, Reiner Kammüller
2009 2009 Fourth International Conference on Internet Monitoring and Protection  
We would like to thank Jeff Sanders for helping us to get the initial understanding and the anonymous referees for constructive criticism.  ...  Any lower-case name is interpreted as a constant, and highercase names are variables. These various language features are used below when considering our database enquiry.  ...  From this, we devise a simple idea of a different database enquiry that achieves privacy. We illustrate this solution using a prototype in the parallel programming language Erlang (Section 2).  ... 
doi:10.1109/icimp.2009.15 fatcat:mdpcdvmb4rhfxjkqi3nc3x5ugu
« Previous Showing results 1 — 15 out of 72,840 results