Confidentiality-Preserving Publish/Subscribe
نویسندگان
چکیده
منابع مشابه
Confidentiality-Preserving Refinement
We develop a condition for confidentiality-preserving refinement which is both necessary and sufficient. Using a slight extension of CSP as notation, we give a toy example to illustrate the usefulness of our condition. Systems are specified by their behavior and a window. For an abstract system, the window specifies what information is allowed to be observed by its environment. For a concrete s...
متن کاملAbstractions Preserving Parameter Confidentiality
ions Preserving Parameter Confidentiality ? Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph Fraunhofer – Institute for Secure Information Technology SIT, Germany {guergens,ochsenschlaeger,rudolphc}@sit.fraunhofer.de Abstract. Confidentiality of certain parameters is an essential security Confidentiality of certain parameters is an essential security requirement for many security sensitive...
متن کاملRFC 5520 Preserving Topology Confidentiality
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Multiprotocol Label Switching (M...
متن کاملFully Deniable Message Authentication Protocols Preserving Confidentiality
1Department of Computer Science Electrical Engineering, University of Missouri-Kansas City, Kansas City, MO 64110, USA 2Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 62102, Taiwan 3Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fujian 350007, P. R. China 4Department of Information Engineering and Computer Scienc...
متن کاملDistributed Shuffling for Preserving Access Confidentiality
The shuffle index has been recently proposed for organizing and accessing data in outsourcing scenarios while protecting the confidentiality of the data as well as of the accesses to them. In this paper, we extend the shuffle index to the use of multiple servers for storing data, introducing a new protection technique (shadow) and enriching the original ones by operating in a distributed scenar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 2016
ISSN: 0360-0300,1557-7341
DOI: 10.1145/2940296