Blockchain Based Auditable Access Control For Business Processes With Event Driven Policies [0.03%]
一种基于区块链的可审计的企业流程访问控制方法及其事件驱动策略技术方案
Ahmed Akhtar,Masoud Barati,Basit Shafiq et al.
Ahmed Akhtar et al.
The use of blockchain technology has been proposed to provide auditable access control for individual resources. Unlike the case where all resources are owned by a single organization, this work focuses on distributed applications such as b...
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks [0.03%]
通过缓解关联攻击实现关系数据库的鲁棒指纹识别
Tianxi Ji,Erman Ayday,Emre Yilmaz et al.
Tianxi Ji et al.
Database fingerprinting is widely adopted to prevent unauthorized data sharing and identify source of data leakages. Although existing schemes are robust against common attacks, their robustness degrades significantly if attackers utilize i...
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services [0.03%]
超越边界的信任:保护区域内的服务的轻量级可验证用户隔离
Wenhao Wang,Weijie Liu,Hongbo Chen et al.
Wenhao Wang et al.
Due to the absence of in-enclave isolation, today's trusted execution environment (TEE), specifically Intel's Software Guard Extensions (SGX), does not have the capability to securely run different users' tasks within a single enclave, whic...
Ruiyu Zhu,Yan Huang
Ruiyu Zhu
Secure string-comparison by some non-linear metrics such as edit-distance and its variations is an important building block of many applications including patient genome matching and text-based intrusion detection. Despite the significance ...
Lucene-P2: A Distributed Platform for Privacy-Preserving Text-based Search [0.03%]
Lucene-P2:基于文本的隐私保护分布式检索平台
Nitish Uplavikar,Brad Malin,Wei Jiang
Nitish Uplavikar
Information retrieval (IR) plays an essential role in daily life. However, currently deployed IR technologies, e.g., Apache Lucene - open-source search software, are insufficient when the information is protected or deemed to be private. Fo...
Yasmeen Alufaisan,Murat Kantarcioglu,Yan Zhou
Yasmeen Alufaisan
Transparency has become a critical need in machine learning (ML) applications. Designing transparent ML models helps increase trust, ensure accountability, and scrutinize fairness. Some organizations may opt-out of transparency to protect i...
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy [0.03%]
差分隐私下的多方安全加法综合比较研究
Slawomir Goryczka,Li Xiong
Slawomir Goryczka
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Sha...
You Chen,Steve Nyemba,Bradley Malin
You Chen
Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users fu...