-
1
-
-
79960012182
-
-
CoRR, abs/1103.5188
-
M. S. Alvim, M. E. Andrés, K. Chatzikokolakis, P. Degano, and C. Palamidessi. Differential privacy: On the trade-off between utility and information leakage. CoRR, abs/1103.5188, 2011.
-
(2011)
Differential Privacy: On the Trade-Off between Utility and Information Leakage
-
-
Alvim, M.S.1
Andrés, M.E.2
Chatzikokolakis, K.3
Degano, P.4
Palamidessi, C.5
-
3
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh. Cells: A virtual mobile smartphone architecture. In SOSP, 2011.
-
(2011)
SOSP
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
4
-
-
77957936026
-
-
Google App Engine. https://developers.google.com/appengine.
-
Google App Engine
-
-
-
5
-
-
84874786070
-
Obliviad: Provably secure and practical online behavioral advertising
-
M. Backes, A. Kate, M. Maffei, and K. Pecina. Obliviad: Provably secure and practical online behavioral advertising. In S&P, 2012.
-
(2012)
S&P
-
-
Backes, M.1
Kate, A.2
Maffei, M.3
Pecina, K.4
-
6
-
-
80052677847
-
Information-theoretic bounds for differentially private mechanisms
-
G. Barthe and B. Kopf. Information-theoretic bounds for differentially private mechanisms. In CSF, 2011.
-
(2011)
CSF
-
-
Barthe, G.1
Kopf, B.2
-
8
-
-
80051990341
-
You might also like:” privacy risks of collaborative filtering
-
J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. “You might also like:” privacy risks of collaborative filtering. In S&P, 2011.
-
(2011)
S&P
-
-
Calandrino, J.A.1
Kilzer, A.2
Narayanan, A.3
Felten, E.W.4
Shmatikov, V.5
-
9
-
-
84910659277
-
Towards statistical queries over distributed private user data
-
R. Chen, A. Reznichenko, P. Francis, and J. Gehrke. Towards statistical queries over distributed private user data. In NSDI, 2012.
-
(2012)
NSDI
-
-
Chen, R.1
Reznichenko, A.2
Francis, P.3
Gehrke, J.4
-
10
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Communication of the ACM, 19(5), May 1976.
-
(1976)
Communication of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
13
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, 2003.
-
(2003)
PODS
-
-
Dinur, I.1
Nissim, K.2
-
14
-
-
50249086141
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
15
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2006.
-
(2006)
TCC
-
-
Dwork, C.1
Mcsherry, F.2
Nissim, K.3
Smith, A.4
-
18
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
20
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention, comprehension, and behavior. In SOUPS, 2012.
-
(2012)
SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
21
-
-
85041431588
-
HAILS: Protecting data privacy in untrusted web applications
-
D. B. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazières, J. Mitchell, and A. Russo. Hails: Protecting data privacy in untrusted web applications. In OSDI, 2012.
-
(2012)
OSDI
-
-
Giffin, D.B.1
Levy, A.2
Stefan, D.3
Terei, D.4
Mazières, D.5
Mitchell, J.6
Russo, A.7
-
22
-
-
84943299684
-
Privad: Practical privacy in online advertising
-
S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In NSDI, 2011.
-
(2011)
NSDI
-
-
Guha, S.1
Cheng, B.2
Francis, P.3
-
23
-
-
85076709531
-
-
HBase. http://hbase.apache.org.
-
-
-
-
24
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. In EuroSys, 2006.
-
(2006)
EuroSys
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
25
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: Retrofitting Android to protect data from imperious applications. In CCS, 2011.
-
(2011)
CCS
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
26
-
-
85076709246
-
Embassies: Radically refactoring the web
-
J. Howell, B. Parno, and J. R. Douceur. Embassies: Radically refactoring the web. In NSDI, 2013.
-
(2013)
NSDI
-
-
Howell, J.1
Parno, B.2
Douceur, J.R.3
-
27
-
-
0026156690
-
Reducing timing channels with fuzzy time
-
W.-M. Hu. Reducing timing channels with fuzzy time. In S&P, 1991.
-
(1991)
S&P
-
-
Hu, W.-M.1
-
29
-
-
85076717894
-
-
Jetty. http://www.eclipse.org/jetty.
-
-
-
-
30
-
-
84871902633
-
Privacy violations using microtargeted ads: A case study
-
A. Korolova. Privacy violations using microtargeted ads: A case study. Journal of Privacy and Confidentiality, 3(1), 2011.
-
(2011)
Journal of Privacy and Confidentiality
, vol.3
, Issue.1
-
-
Korolova, A.1
-
31
-
-
70449657350
-
Noninterference for a practical DIFC-based operating system
-
M. Krohn and E. Tromer. Noninterference for a practical DIFC-based operating system. In S&P, 2009.
-
(2009)
S&P
-
-
Krohn, M.1
Tromer, E.2
-
32
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions. In SOSP, 2007.
-
(2007)
SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
33
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10), Oct. 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
-
-
Lampson, B.W.1
-
34
-
-
85076682807
-
-
App sandbox in depth. http://developer.apple.com/library/mac/ #documentation/Security/Conceptual/ AppSandboxDesignGuide/AppSandboxInDepth/ AppSandboxInDepth.html.
-
App Sandbox in Depth
-
-
-
35
-
-
77956293777
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
Sept
-
F. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. Commun. ACM, 53(9), Sept. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.9
-
-
McSherry, F.1
-
37
-
-
80052803379
-
Do windows users follow the principle of least privilege? investigating user account control practices
-
S. Motiee, K. Hawkey, and K. Beznosov. Do Windows users follow the principle of least privilege? Investigating User Account Control practices. In SOUPS, 2010.
-
(2010)
SOUPS
-
-
Motiee, S.1
Hawkey, K.2
Beznosov, K.3
-
38
-
-
0002934582
-
A decentralized model for information flow control
-
A. C. Myers and B. Liskov. A decentralized model for information flow control. In SOSP, 1997.
-
(1997)
SOSP
-
-
Myers, A.C.1
Liskov, B.2
-
40
-
-
85076691707
-
-
OpenStreetMap. http://www.openstreetmap. org.
-
-
-
-
41
-
-
85076680944
-
-
https://play.google.com/store/apps/details? id=net.osmand&hl=en
-
OsmAnd. http://osmand.net, https://play.google.com/store/apps/details? id=net.osmand&hl=en.
-
-
-
-
42
-
-
70449632684
-
CLAMP: Practical prevention of large-scale data leaks
-
B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig. CLAMP: Practical prevention of large-scale data leaks. In S&P, 2009.
-
(2009)
S&P
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
-
46
-
-
80755143986
-
Auctions in do-not-track compliant internet advertising
-
A. Reznichenko, S. Guha, and P. Francis. Auctions in do-not-track compliant internet advertising. In CCS, 2011.
-
(2011)
CCS
-
-
Reznichenko, A.1
Guha, S.2
Francis, P.3
-
47
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In CCS, 2009.
-
(2009)
CCS
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
48
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In NSDI, 2010.
-
(2010)
NSDI
-
-
Roy, I.1
Setty, S.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
51
-
-
85076687795
-
-
https://play.google.com/store/apps/details?id=net. sourceforge.servestream&hl=en
-
ServeStream. http://sourceforge.net/projects/servestream, https://play.google.com/store/apps/details?id=net. sourceforge.servestream&hl=en.
-
-
-
-
52
-
-
85076289299
-
XBook: Redesigning privacy control in social networking platforms
-
K. Singh, S. Bhola, and W. Lee. xBook: Redesigning privacy control in social networking platforms. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Singh, K.1
Bhola, S.2
Lee, W.3
-
55
-
-
84899629080
-
Context-centric security
-
M. Tiwari, P. Mohan, A. Osheroff, H. Alkaff, E. Shi, E. Love, D. Song, and K. Asanović. Context-centric security. In HotSec, 2012.
-
(2012)
HotSec
-
-
Tiwari, M.1
Mohan, P.2
Osheroff, A.3
Alkaff, H.4
Shi, E.5
Love, E.6
Song, D.7
Asanović, K.8
-
57
-
-
84866604942
-
Keeping information safe from social networking apps
-
B. Viswanath, E. Kiciman, and S. Saroiu. Keeping information safe from social networking apps. In WOSN, 2012.
-
(2012)
WOSN
-
-
Viswanath, B.1
Kiciman, E.2
Saroiu, S.3
-
58
-
-
85076671169
-
-
VMware Horizon Mobile. https://blogs.vmware.com/euc/2012/08/ vmware-horizon-mobile-on-ios.html.
-
VMware Horizon Mobile
-
-
-
61
-
-
82655179240
-
CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
F. Zhang, J. Chen, H. Chen, and B. Zang. CloudVisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In SOSP, 2011.
-
(2011)
SOSP
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
-
62
-
-
77952354362
-
Neon: System support for derived data management
-
Q. Zhang, J. McCullough, J. Ma, N. Schear, M. Vrable, A. Vahdat, A. C. Snoeren, G. M. Voelker, and S. Savage. Neon: System support for derived data management. In VEE, 2010.
-
(2010)
VEE
-
-
Zhang, Q.1
McCullough, J.2
Ma, J.3
Schear, N.4
Vrable, M.5
Vahdat, A.6
Snoeren, A.C.7
Voelker, G.M.8
Savage, S.9
|