Keeping Secrets

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Keeping Secrets with Public Communication

Given some deal of cards, it is possible to communicate your hand to another player without yet another player learning any of your cards. Every solution to this problem consists of a sequence of safe communications, an interesting new form of update. Certain unsafe communications turn out to be unsuccessful updates. Each communication can be about a set of alternative card deals only, and even...

متن کامل

Weighing Coins and Keeping Secrets

In this expository paper we discuss a relatively new counterfeit coin problem with an unusual goal: maintaining the privacy of, rather than revealing, counterfeit coins in a set of both fake and real coins. We introduce two classes of solutions to this problem — one that respects the privacy of all the coins and one that respects the privacy of only the fake coins — and give several results reg...

متن کامل

Keeping Secrets in Incomplete Databases [ Extended

Controlled query evaluation preserves confidentiality in information systems at runtime. A security policy specifies the facts a certain user is not allowed to know. At each query, a censor checks whether the answer would enable the user to learn any classified information. In that case, the answer is distorted, either by lying or by refusal. We introduce a framework in which controlled query e...

متن کامل

Keeping Secrets within a Family: Rediscovering Parnas

David Parnas wrote several papers in the 1970’s and 1980’s that are now considered classics. The concepts he advocated such as information hiding and use of abstract interfaces are generally accepted as the appropriate way to design nontrivial software systems. However, not all of what he proposed has been fully appreciated and assimilated into our practices. Many of his simple, elegant ideas h...

متن کامل

Keeping Secrets in Resource Aware Components

We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication of a component, interact with it and monitor the components resource usage. We use an automata model of components in which each transition is tagged with resource usage information. We extend these automata to pass val...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mechanical Engineering

سال: 2010

ISSN: 0025-6501,1943-5649

DOI: 10.1115/1.2010-aug-3