In a computing system, sensitive data must be protected by release policies that determine which principals are authorized to access that data. In some cases, such a release policy could refer to information about the requesting principal that is unavailable to the information provider. Furthermore, the release policy itself may contain sensitive information about the resource that it protects. In this paper we describe a scheme for enforcing information release policies whose satisfaction cannot be verified by the entity holding the protected information, but only by the entity requesting this information. Not only does our scheme prevent the information provider from learning whether the policy was satisfied, but it also hides the informa...
In today\u2019s electronic society, data sharing and dissemination are more and more increasing, lea...
Security assurance is an important challenge for modern computing. Intentional information release (...
Controlled release of information from an organization is becoming important from various considerat...
In a computing system, sensitive data must be protected by release policies that determine which pri...
In a computing system, sensitive data must be protected by release policies that determine which pri...
In a computing system, sensitive data must be protected by release policies that determine which pri...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
Many computer systems have a functional requirement to release information. Such requirements are an...
Security assurance is an important challenge for modern computing. Intentional information release (...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Security assurance is an important challenge for moderncomputing. Intentional information release (d...
Abstract. Much work on security-typed languages lacks a satisfactory account of intentional informat...
Decentralization is a major challenge for secure computing. In a decentralized setting, principals a...
Much work on security-typed languages lacks a satisfactory account ofintentional information release...
In today\u2019s electronic society, data sharing and dissemination are more and more increasing, lea...
Security assurance is an important challenge for modern computing. Intentional information release (...
Controlled release of information from an organization is becoming important from various considerat...
In a computing system, sensitive data must be protected by release policies that determine which pri...
In a computing system, sensitive data must be protected by release policies that determine which pri...
In a computing system, sensitive data must be protected by release policies that determine which pri...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
Many computer systems have a functional requirement to release information. Such requirements are an...
Security assurance is an important challenge for modern computing. Intentional information release (...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Security assurance is an important challenge for moderncomputing. Intentional information release (d...
Abstract. Much work on security-typed languages lacks a satisfactory account of intentional informat...
Decentralization is a major challenge for secure computing. In a decentralized setting, principals a...
Much work on security-typed languages lacks a satisfactory account ofintentional information release...
In today\u2019s electronic society, data sharing and dissemination are more and more increasing, lea...
Security assurance is an important challenge for modern computing. Intentional information release (...
Controlled release of information from an organization is becoming important from various considerat...