منابع مشابه
Keeping Secrets with Public Communication
Given some deal of cards, it is possible to communicate your hand to another player without yet another player learning any of your cards. Every solution to this problem consists of a sequence of safe communications, an interesting new form of update. Certain unsafe communications turn out to be unsuccessful updates. Each communication can be about a set of alternative card deals only, and even...
متن کاملWeighing Coins and Keeping Secrets
In this expository paper we discuss a relatively new counterfeit coin problem with an unusual goal: maintaining the privacy of, rather than revealing, counterfeit coins in a set of both fake and real coins. We introduce two classes of solutions to this problem — one that respects the privacy of all the coins and one that respects the privacy of only the fake coins — and give several results reg...
متن کاملKeeping Secrets in Incomplete Databases [ Extended
Controlled query evaluation preserves confidentiality in information systems at runtime. A security policy specifies the facts a certain user is not allowed to know. At each query, a censor checks whether the answer would enable the user to learn any classified information. In that case, the answer is distorted, either by lying or by refusal. We introduce a framework in which controlled query e...
متن کاملKeeping Secrets within a Family: Rediscovering Parnas
David Parnas wrote several papers in the 1970’s and 1980’s that are now considered classics. The concepts he advocated such as information hiding and use of abstract interfaces are generally accepted as the appropriate way to design nontrivial software systems. However, not all of what he proposed has been fully appreciated and assimilated into our practices. Many of his simple, elegant ideas h...
متن کاملKeeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication of a component, interact with it and monitor the components resource usage. We use an automata model of components in which each transition is tagged with resource usage information. We extend these automata to pass val...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mechanical Engineering
سال: 2010
ISSN: 0025-6501,1943-5649
DOI: 10.1115/1.2010-aug-3