نتایج جستجو برای: data sanitization

تعداد نتایج: 2410486  

Journal: :World Journal Of Advanced Research and Reviews 2023

The dairy industry extensively utilizes clean-in-place (CIP) systems for cleaning and sanitization, employing a closed-circuit method that enables the sanitization of equipment, silos, piping, isothermal tanks without disassembly. This process enhances safety quality in initiating production process. research adopts qualitative approach, bibliographic search methodology includes consulting vari...

Journal: :Logical Methods in Computer Science 2011
Aslan Askarov Andrew C. Myers

Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Securitytyped languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been t...

2015
Abdulbaki Aydin Lucas Bang Tevfik Bultan

Most common vulnerabilities in Web applications are due to string manipulation errors in input validation and sanitization code. String constraint solvers are essential components of program analysis techniques for detecting and repairing vulnerabilities that are due to string manipulation errors. For quantitative and probabilistic program analyses, checking the satisfiability of a constraint i...

2013
SONIA HAMEED Mohammad Ali Jinnah

Data mining is used to extract useful information hidden in the data. Sometimes this extraction of information leads to revealing sensitive information. Privacy preservation in Data Mining is a process of sanitizing sensitive information. This research focuses on sanitizing sensitive rules discovered in quantitative data. The proposed scheme, Privacy Preserving in Fuzzy Association Rules (PPFAR...

Journal: :CoRR 2008
Martin Burkhart Daniela Brauckhoff Martin May

The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or intro...

2009
Yücel Saygin Dilek Z. Hakkani-Tür Gökhan Tür

Information security and privacy in the context of the World Wide Web (WWW) is an important issue that is still being investigated. However, most of the present research is dealing with access control, and authentication-based trust. Especially with the popularity of WWW, being one of the largest information sources, privacy of the individuals is now as important as the security of information....

2010
Aslan Askarov Andrew C. Myers

Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید