Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Cataloged from student-submitted PDF version of thesis.Includes bibliographical references (p. 177-194).Privacy and integrity concerns have been mounting in recent years as sensitive data such as medical records, social network records, and corporate and government secrets are increasingly being stored in online systems. The rate of high-profile breaches has illustrated that current techniques are inadequate for protecting sensitive information. Many of these breaches involve database...
Information security is of utmost concern in a multiuser environment. The importance of security is ...
Ensuring the security of databases is a complex issue. The more complex the databases are the more c...
Securing database-backed applications requires tracking information across the application program a...
Numerous sensitive databases are breached every year due to bugs in applications. These applications...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
This paper presents a practical application of language-based information-flow control, namely, a do...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Healthcare organizations generate massive amounts of data through their databases that may be vulner...
We present an approach for dynamic information flow control across the application and database. Our...
PhD thesisPrivate and confidential information is increasingly stored online and increasingly being ...
As more and more sensitive data is handled by software, its trustworthinessbecomes an increasingly i...
Real data used in research projects give rise to conflicts of protecting privacy and providing more ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Database security has evolved; data security professionals have developed numerous techniques and ap...
Information security is of utmost concern in a multiuser environment. The importance of security is ...
Ensuring the security of databases is a complex issue. The more complex the databases are the more c...
Securing database-backed applications requires tracking information across the application program a...
Numerous sensitive databases are breached every year due to bugs in applications. These applications...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
This paper presents a practical application of language-based information-flow control, namely, a do...
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer ...
Healthcare organizations generate massive amounts of data through their databases that may be vulner...
We present an approach for dynamic information flow control across the application and database. Our...
PhD thesisPrivate and confidential information is increasingly stored online and increasingly being ...
As more and more sensitive data is handled by software, its trustworthinessbecomes an increasingly i...
Real data used in research projects give rise to conflicts of protecting privacy and providing more ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Database security has evolved; data security professionals have developed numerous techniques and ap...
Information security is of utmost concern in a multiuser environment. The importance of security is ...
Ensuring the security of databases is a complex issue. The more complex the databases are the more c...
Securing database-backed applications requires tracking information across the application program a...