Fine-grained information flow control using attributes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fine-Grained Comparisons with Attributes

Given two images, we want to predict which exhibits a particular visual attribute more than the other—even when the two images are quite similar. For example, given two beach scenes, which looks more calm? Given two high-heeled shoes, which is more ornate? Existing relative attribute methods rely on global ranking functions. However, rarely will the visual cues relevant to a comparison be const...

متن کامل

A Fine Grained Access Control Model Based on Diverse Attributes

As the web has become a place for sharing of information and resources across varied domains, there is a need for providing authorization services in addition to authentication services provided by public key infrastructure (PKI). In distributed systems the use of attribute certificates (AC) has been explored as a solution for implementation of authorization services and their use is gaining po...

متن کامل

Authentic Attributes with Fine-Grained Anonymity Protection

Collecting accurate pro le information and protecting an individual's privacy are ordinarily viewed as being at odds. This paper presents mechanisms that protect individual privacy while presenting accurate|indeed authenticated|pro le information to servers and merchants. In particular, we give a pseudonym registration scheme and system that enforces unique user registration while separating tr...

متن کامل

Coarse-grained information dominates fine-grained information in judgments of time-to-contact from retinal flow

To investigate the relative importance of fine- and coarse-grained structure in the analysis of retinal flow, subjects made estimates of time-to-contact from random dot kinematograms depicting movement towards a flat, sparsely textured surface. Individual display elements moved smoothly away from each other while expanding smoothly in size. By artificially manipulating the rate at which the ind...

متن کامل

WebPol: Fine-Grained Information Flow Policies for Web Browsers

In the standard web browser programming model, thirdparty scripts included in an application execute with the same privilege as the application’s own code. This leaves the application’s confidential data vulnerable to theft and leakage by malicious code and inadvertent bugs in the third-party scripts. Security mechanisms in modern browsers (the same-origin policy, cross-origin resource sharing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Sciences

سال: 2019

ISSN: 0020-0255

DOI: 10.1016/j.ins.2019.01.074