Abstract
The present column is dedicated to non-interference, a fundamental security property that is used in the literature to reason about information flow in a variety of different settings, such as imperative languages, Java bytecode, JavaScript, web applications, mobile applications, and interactive systems, just to name a few. This property can be enforced using several program verification techniques, such as run-time monitoring and static analysis. Among these, type systems are perhaps the most popular approach.
Recommendations
Security and Privacy Column
Differential privacy is nowadays considered the "gold standard" when releasing information, e.g., statistics, on sensitive data. To avoid leaking too much sensitive data noise-adding mechanisms may be used. ϵ-differential privacy measures the amount of ...
Scaling Matrices to Prescribed Row and Column Maxima
A nonnegative symmetric matrix $B$ has row maxima prescribed by a given vector $r$, if for each index $i$, the maximum entry in the $i$th row of $B$ equals $r_i$. This paper presents necessary and sufficient conditions so that for a given nonnegative ...
Privacy Protection: p-Sensitive k-Anonymity Property
ICDEW '06: Proceedings of the 22nd International Conference on Data Engineering WorkshopsIn this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails to protect against attribute disclosure. The new introduced privacy model ...
Comments