Results 11 to 20 of about 974,570 (322)
Statically checking confidentiality via dynamic labels [PDF]
This paper presents a new approach for verifying confidentiality for programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prover PVS. We use dynamic labeling functions to abstractly interpret a
Jacobs, B.P.F., Pieters, W., Warnier, M.
core +8 more sources
Bundesstatistikgesetz 2000 – einige Anmerkungen aus supranationaler Perspektive
Das neue Bundesstatistikgesetz 2000 überläßt der Praxis einen großen Freiraum, wie die Spielregeln für die Grundprinzipien der amtlichen Statistik in Österreich tatsächliche Geltung erlangen.
Christian Engelage
doaj +1 more source
The U.S. Law of Client Confidentiality: Framework for an International Perspective [PDF]
In this Article, I will consider two general areas of the U.S. law of confidentiality. In Part I, I will reflect briefly upon what I call “the U.S. culture of lawyer-client confidentiality.” I say “culture” rather than “cult,” and one must guard against ...
Barbara Casadei+10 more
core +2 more sources
BIOETHICAL ASPECTS IN THE APPROACH OF THE MINOR PATIENT – GENERAL REVIEW [PDF]
The objective of this review was to present the main ethical issues in minor patient healthcare activity including: minor patient consent, parental consent, confidentiality and medical examination.
Andreea Sălcudean+4 more
doaj +1 more source
Confidentialising Survival Analysis Output in a Remote Data Access System
A remote analysis system addresses the challenge of enabling the use of confidential or private data while maintaining standards of confidentiality and privacy.
Christine M. O'Keefe+3 more
doaj +1 more source
In late September, the American Academy of Pediatrics published an article updating their 2007 recommendations regarding adolescent contraception. The article calls on pediatricians to educate adolescents who choose to engage in sexual activity on a wide
Kaitlynd Hiller
doaj +1 more source
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings
Based on Sun et al.'s multi-client symmetric searchable encryption (SSE) scheme (at ESORICS 2016), and combining Zhao's identity-concealed authenticated encryption (CCS 2016), a new SSE scheme with multi-data-owner functionalities is proposed. By setting
Huige Wang+3 more
doaj +1 more source
Recently several proposals of blockchain-based solutions for traditional e-commerce applications have been presented, taking advantage of the fact that blockchain is a technology that offers an immutable registry of data.
Macia Mut-Puigserver+2 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh+2 more
doaj +1 more source
The features of decentralization and tamper-proof enable blockchain to be an emerging technology for integrity protection of important data stored on it.
Lifeng Guo, Xiaoli Yang, Wei-Chuen Yau
doaj +1 more source