منابع مشابه
Tryst: The Case for Confidential Service Discovery
Local service discovery exposes sensitive information about identity, location, and relationships. We present empirical evidence that suggests the release of this information in wireless environments poses a real danger to our privacy. We then discuss the challenges in the design of Tryst, an architecture that enhances the confidentiality of existing service discovery mechanisms.
متن کاملA Computational Logic Application Framework for Service Discovery and Contracting
In Semantic Web technologies, searching for a service means identifying components that can potentially satisfy user needs in terms of inputs and outputs (discovery) and devise a fruitful interaction with the customer (contracting). In this paper, the authors present an application framework that encompasses both the discovery and the contracting steps in a unified search process. In particular...
متن کاملSecure Contexts for Confidential Data
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the process is going to run is available. To deal with these situations we introduce the notion of secure c...
متن کاملProviding confidential care for adolescents.
Near the end of her sports physical examination, a 16-yearold girl seems worried. The physician offers her some time without her mother in the room. Once in private, the girl quickly requests a pregnancy test. Although the test result is negative, this is a perfect teaching opportunity. Adolescents are generally healthy, but they commonly present with high-risk behaviors that are often missed b...
متن کاملCompact Confidential Transactions for Bitcoin
An enhancement is suggested to make Bitcoin transaction amounts hidden to all but the sender and receiver. In each transaction, the output amounts are encrypted with the public keys of the respective receivers. Only the transaction fee is publicly revealed, to allow miners to prioritise transactions. A homomorphic commitment for each transaction proves that the sum of the transaction inputs mat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2020
ISSN: 1556-5068
DOI: 10.2139/ssrn.3620434