Keeping Secrets: The Economics of Access Deterrence
نویسندگان
چکیده
منابع مشابه
Keeping Secrets with Public Communication
Given some deal of cards, it is possible to communicate your hand to another player without yet another player learning any of your cards. Every solution to this problem consists of a sequence of safe communications, an interesting new form of update. Certain unsafe communications turn out to be unsuccessful updates. Each communication can be about a set of alternative card deals only, and even...
متن کاملWeighing Coins and Keeping Secrets
In this expository paper we discuss a relatively new counterfeit coin problem with an unusual goal: maintaining the privacy of, rather than revealing, counterfeit coins in a set of both fake and real coins. We introduce two classes of solutions to this problem — one that respects the privacy of all the coins and one that respects the privacy of only the fake coins — and give several results reg...
متن کاملfaciliting lexical access for the fluent production of speech
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis,a one-way anova experimental design was carried out. 24 sednior students of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inter...
15 صفحه اولfacilitating lexical access for the fluent production of speech
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis , a one- way anova experimental design was carried out. 24 senior student of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inte...
15 صفحه اولKeeping Secrets in Incomplete Databases [ Extended
Controlled query evaluation preserves confidentiality in information systems at runtime. A security policy specifies the facts a certain user is not allowed to know. At each query, a censor checks whether the answer would enable the user to learn any classified information. In that case, the answer is distorted, either by lying or by refusal. We introduce a framework in which controlled query e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Economic Journal: Microeconomics
سال: 2016
ISSN: 1945-7669,1945-7685
DOI: 10.1257/mic.20140190