DE eng

Search in the Catalogues and Directories

Page: 1 2
Hits 1 – 20 of 34

1
Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities
In: IEEE Transactions on Industrial Informatics ; https://hal.archives-ouvertes.fr/hal-03456142 ; IEEE Transactions on Industrial Informatics, 2021, 14 (30), pp.1 (2021)
BASE
Show details
2
Statistical ZAPs from Group-Based Assumptions
In: TCC 2021 - Theory of Cryptography Conference ; https://hal.archives-ouvertes.fr/hal-03374562 ; TCC 2021 - Theory of Cryptography Conference, Nov 2021, Raleigh, United States (2021)
BASE
Show details
3
Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication
In: https://hal.archives-ouvertes.fr/hal-03445994 ; 2021 (2021)
BASE
Show details
4
Enhancing Speech Privacy with Slicing
In: https://hal.inria.fr/hal-03369137 ; 2021 (2021)
BASE
Show details
5
Introducing the VoicePrivacy initiative
In: INTERSPEECH 2020 ; https://hal.inria.fr/hal-02562199 ; INTERSPEECH 2020, Oct 2020, Shanghai, China (2020)
BASE
Show details
6
Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols
In: DISC 2020 - 34th International Symposium on Distributed Computing ; https://hal.inria.fr/hal-02166432 ; DISC 2020 - 34th International Symposium on Distributed Computing, Oct 2020, Freiburg / Virtual, Germany (2020)
BASE
Show details
7
Private Protocols for U-Statistics in the Local Model and Beyond
In: AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics ; https://hal.inria.fr/hal-02310236 ; AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics, Aug 2020, Palermo, Italy (2020)
BASE
Show details
8
The Conflict Notion and its Static Detection: a Formal Survey
In: https://hal.archives-ouvertes.fr/hal-02169360 ; [Research Report] IMT Atlantique. 2019 (2019)
Abstract: The notion of policy is widely used to enable a flexible control of many systems: access control, privacy, accountability, data base, service, contract , network configuration, and so on. One important feature is to be able to check these policies against contradictions before the enforcement step. This is the problem of the conflict detection which can be done at different steps and with different approaches. This paper presents a review of the principles for conflict detection in related security policy languages. The policy languages, the notions of conflict and the means to detect conflicts are various, hence it is difficult to compare the different principles. We propose an analysis and a comparison of the five static detection principles we found in reviewing more than forty papers of the literature. To make the comparison easier we develop a logical model with four syntactic types of systems covering most of the literature examples. We provide a semantic classification of the conflict notions and thus, we are able to relate the detection principles, the syntactic types and the semantic classification. Our comparison shows the exact link between logical consistency and the conflict notions, and that some detection principles are subject to weaknesses if not used with the right conditions.
Keyword: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]; [INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]; Chaining; Conflict; Security Policy; Static Detection; Undefined Request
URL: https://hal.archives-ouvertes.fr/hal-02169360
https://hal.archives-ouvertes.fr/hal-02169360/document
https://hal.archives-ouvertes.fr/hal-02169360/file/main.pdf
BASE
Hide details
9
MASSE: Modular Automated Syntactic Signature Extraction
In: RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information ; https://hal.inria.fr/hal-02159947 ; RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1 (2019)
BASE
Show details
10
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
In: IEEE Symposium on Security and Privacy (S&P) 2019 ; https://hal.inria.fr/hal-01974962 ; IEEE Symposium on Security and Privacy (S&P) 2019, May 2019, San Francisco, United States (2019)
BASE
Show details
11
Sequence Covering for Efficient Host-Based Intrusion Detection
In: ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.archives-ouvertes.fr/hal-01653650 ; IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2019, 14 (4), pp.994-1006. ⟨10.1109/TIFS.2018.2868614⟩ ; https://ieeexplore.ieee.org/document/8454473 (2019)
BASE
Show details
12
The DEEPSEC prover
In: CAV 2018 - 30th International Conference on Computer Aided Verification ; https://hal.inria.fr/hal-01763138 ; CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom (2018)
BASE
Show details
13
Specification-Based Protocol Obfuscation
In: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks ; https://hal.inria.fr/hal-01848573 ; DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩ (2018)
BASE
Show details
14
Tutorial: an Overview of Malware Detection and Evasion Techniques
In: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation ; https://hal.inria.fr/hal-01964222 ; ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23 (2018)
BASE
Show details
15
Taint-Based Return Oriented Programming
In: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications ; https://hal.inria.fr/hal-01848575 ; SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2018, Rennes, France. pp.1-30 ; https://www.sstic.org/2018/ (2018)
BASE
Show details
16
Modular Software Fault Isolation as Abstract Interpretation
In: SAS 2018 - 25th International Static Analysis Symposium ; https://hal.inria.fr/hal-01894116 ; SAS 2018 - 25th International Static Analysis Symposium, Aug 2018, Freiburg, Germany. pp.166-186, ⟨10.1007/978-3-319-99725-4_12⟩ (2018)
BASE
Show details
17
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
In: Lecture Notes in Computer Science ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice ; https://hal.archives-ouvertes.fr/hal-01802720 ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩ (2017)
BASE
Show details
18
MASSE: Modular Automated Syntactic Signature Extraction
In: ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE ; https://hal.inria.fr/hal-01629035 ; ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE, Oct 2017, Toulouse, France. pp.1-2 (2017)
BASE
Show details
19
Dependent Event Types
In: Logic, Language, Information, and Computation ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017) ; https://hal.archives-ouvertes.fr/hal-01913662 ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017), Jul 2017, London, United Kingdom. pp. 216-228 (2017)
BASE
Show details
20
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
In: ISSN: 2474-1558 ; Foundations and Trends® in Privacy and Security ; https://hal.inria.fr/hal-01423760 ; Foundations and Trends® in Privacy and Security , Now publishers inc, 2016, 1 (1-2), pp.1 - 135. ⟨10.1561/3300000004⟩ (2016)
BASE
Show details

Page: 1 2

Catalogues
0
0
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
0
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
34
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern