Filters








454,369 Hits in 3.0 sec

Reasoning About Distributed Secrets [chapter]

Nicolás Bordenabe, Annabelle McIver, Carroll Morgan, Tahiry Rabehaja
2017 Lecture Notes in Computer Science  
The aim here is to study this issue in a context of programs with distributed secrets.  ...  In 1977 Tore Dalenius described how partial disclosure about one secret can impact the confidentiality of other correlated secrets, and indeed this phenomenon is well-known in privacy of databases.  ...  (x, x ). (7) Reasoning About Distributed, Correlated Secrets We return now to a system of distributed secrets described by X and Z, and we study how to model information flow about Z when only X is updated  ... 
doi:10.1007/978-3-319-60225-7_11 fatcat:4ycrkd37kbcpjd7oheeczi24l4

Algebra for Quantitative Information Flow [chapter]

A. K. McIver, C. C. Morgan, T. Rabehaja
2017 Lecture Notes in Computer Science  
In this paper we show how to extend those ideas to obtain a model of information flow which supports local reasoning about confidentiality.  ...  A core property of program semantics is that local reasoning about program fragments remains sound even when the fragments are executed within a larger system.  ...  in local reasoning in order to predict general information flows about arbitrary secrets in arbitrary contexts.  ... 
doi:10.1007/978-3-319-57418-9_1 fatcat:jp5lsptgsbgczowjsjkqv2tkcu

Short Paper: Dynamic leakage

Nataliia Bielova
2016 Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security - PLAS'16  
PLAS An alternative approach to measure information leakage is to reason about attacker's accuracy in his belief about the secret [9] .  ...  An alternative definition of quantitative information flow has been proposed [9] : instead of reasoning about the decrease in uncertainty of the attacker, it suggests to reason about the change in the  ...  Consider an arbitrary secretṡ ∈ S that leads to an output o, then according to the definition of belief tracking measure, where the distance between the distributions is By the definition of reality pṡ  ... 
doi:10.1145/2993600.2993607 dblp:conf/ccs/Bielova16 fatcat:ctiezoik6nehzfbl5fq2p2zdpa

Applying secret sharing schemes to service reputation

A.S. Namin, Ruizhong Wei, Weiming Shen, H. Ghenniwa
2005 Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005.  
The reputation agent reasons about the business levels of service requesters and decides about the values of their feedbacks or recommendations.  ...  about threshold and secret values for generated reputation structures.  ... 
doi:10.1109/cscwd.2005.194269 dblp:conf/cscwd/NaminWSG05 fatcat:tr3f7riz7bh23dwywsvx4ml7qy

Quantifying vulnerability of secret generation using hyper-distributions (extended version) [article]

Mário S. Alvim, Piotr Mardziel, Michael Hicks
2017 arXiv   pre-print
a distribution on strategies (and, thus, a distribution on distributions on secrets, called a hyper-distribution).  ...  In this paper we explicitly model strategies as distributions on secrets, and generalize the representation of the adversary's prior knowledge from a distribution on secrets to an environment, which is  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes not withstanding any copyright notation thereon.  ... 
arXiv:1701.04174v2 fatcat:phkqtsn25fbtjef5e3r6i4g2ru

Secretion and Distribution of Iodine-131 in Milk from Dairy Cow after Intravenous Administration of a Single Dose

Yoichiro OHMOMO, Masamichi SAIKI
1970 RADIOISOTOPES  
Experiment was carried out in order to know the distribution of 131I in milk and the secretion into milk from lactating Holstein cows after a single intravenous administration.  ...  About 2% and 20% of 131I were found in fat and protein fractions respectively and no regular variation was observed on the distribution pattern as a function of time after administration.  ...  Percentage of the distribution to protein, which was somewhat variable by the method of the separation, was about 20% as shown in Table 3 .  ... 
doi:10.3769/radioisotopes.19.6_282 fatcat:6qh7iqq7fvad5eh3bvkvoydpby

Strategic thinking: The influence of the game

Stefan P. Penczynski
2016 Journal of Economic Behavior and Organization  
game (Nagel, 1995; Costa-Gomes and Crawford, 2006) or the money request game (Arad and Rubinstein, 2012) are informative about the level of reasoning under reasonably few assumptions.  ...  In order to obtain information about subjects' reasoning in addition to choice data, this study applies an experimental design which has been introduced by Burchardi and Penczynski (2014).  ...  Two exceptions are the seekers in the treasure treatment (2b) and the hiders in the secret treatment (2e) which both exhibit a higher fraction of level-2 than level-1 reasoners in both distributions.  ... 
doi:10.1016/j.jebo.2016.05.006 fatcat:m2w6qn3pvban3jjml2aly5beni

Knowledge-oriented secure multiparty computation

Piotr Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa
2012 Proceedings of the 7th Workshop on Programming Languages and Analysis for Security - PLAS '12  
In our approach, each participating party is able to reason about the increase in knowledge that other parties could gain as a result of computing f , and may choose not to participate (or participate  ...  Protocols for secure multiparty computation (SMC) allow a set of mutually distrusting parties to compute a function f of their private inputs while revealing nothing about their inputs beyond what is implied  ...  . • P j 's belief, δ j , about the secrets.  ... 
doi:10.1145/2336717.2336719 dblp:conf/pldi/MardzielHKS12 fatcat:6qooogzbx5gnzabdkydqyeya4e

Cognitive Information Systems in Pervasive Computing and Management Application

Marek R. Ogiela, Lidia Ogiela
2015 International Journal of Knowledge Engineering  
Such systems can reason about the sources financing the company's assets and the proportion of external.  ...  Such systems can reason about the amount and the solvency of the working capital of the company as well as about the company's current operations. 2) UBMARSS (Understanding Based Management Activity  ... 
doi:10.18178/ijke.2015.1.3.041 fatcat:7srvq2ujzjcphoyuvlcnqcwx34

Page 777 of None Vol. 198, Issue 4 [page]

1960 None  
. 16 * 40-min. bile secretion. bile secretion. reasonable estimate of the mean time of transit through the liver, then the increased time of transit resulting from bile stasis would be reasonable to account  ...  If it is assumed that bile se- cretion continues at the normal rate during the first 10 minutes, then the volume of bile secreted would be about 0.15-0.2 ml, approximately 1% of the liver volume.  ... 

Secret Share Based Program Access Authorization Protocol for Smart Metering

Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li, Chunhua Gu
2016 International Journal of Network Security  
This paper first considers the security of smart meter parameters and proposes a novel secret share based program access authorization protocol.  ...  From Figure 5 (b), we can also get the time cost for recovering is about 1.3 milliseconds when t = 17. In addition, the secret key (i.e.  ...  The time cost for encryption and decryption in the fist phase of the protocol, namely the generating and distributing shared keys phase, is only about 94 milliseconds.  ... 
dblp:journals/ijnsec/TianLLLG16 fatcat:6nytclpa7bgj5hu4pfxuissdny

Page 484 of The Journal of Cell Biology Vol. 52, Issue 2 [page]

1972 The Journal of Cell Biology  
For this reason, the graphs of Fig. 7, in which the secreted activities are expressed as per cent of the total activities present in the system at the same time, are somewhat mis¬ leading.  ...  After 5 hr of starvation. the dense lysosomal population is virtually depleted, leaving unimodal distribution patterns around a density of about 1.14.  ... 

Complementary feeding practices among mothers of Waghodia Taluka of Vadodara: a knowledge, attitude, and practice study

Bhadra Trivedi, Shailee Vyas, Bhavin Dave, Khyati Desai
2015 International Journal of Medical Science and Public Health  
Around 75% mothers fed their children by themselves; 17% were unaware about measures for maintaining hygiene.  ...  Knowledge about hygiene practices and illnesses related to poor feeding was also found less and both required more attention. Abstract  ...  Most common reasons for starting complementary feeding This study Insufficient milk secretion (37%) Pathi and Das [5] Inadequate milk secretion (69.3%) Aggarwal et al.  ... 
doi:10.5455/ijmsph.2015.13102014133 fatcat:jsukozqfbjcxxjocx2aefddgaq

Methods of encrypting monotonic access structures

Jakub Derbisz
2011 Annales UMCS Informatica  
We will present some ideas about sharing a secret in a monotonic access structure.  ...  The method of encrypting a monotonic access structure using a family of basis sets or a family of maximal sets that cannot reconstruct the secret will be described in a general way.  ...  Hiding information about a hierarchical structure can be performed by choosing an appropriate method of sharing a secret (for example a method with the families of basis sets) and a proper way of distributing  ... 
doi:10.2478/v10065-011-0011-x fatcat:jsfjktjabfd75erugcblhrdb7e

Page 1172 of Journal of Clinical Investigation Vol. 39, Issue 7 [page]

1960 Journal of Clinical Investigation  
of body weight in about 45 minutes, distribution being about half completed at 15 minutes.  ...  It has been shown previously (22) that I***-labeled insulin in man is metabolized at a rate of about 2 per cent per minute and is distributed into an apparent volume of distribution of about 37 per cent  ... 
« Previous Showing results 1 — 15 out of 454,369 results