MIT Libraries homeMIT Libraries logoDSpace@MIT

MIT
Search 
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • CSAIL Digital Archive
  • CSAIL Technical Reports (July 1, 2003 - present)
  • Search
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • CSAIL Digital Archive
  • CSAIL Technical Reports (July 1, 2003 - present)
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-7 of 7

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Quantitative Information Flow as Network Flow Capacity 

McCamant, Stephen; Ernst, Michael D. (2007-12-10)
We present a new technique for determining how much information abouta program's secret inputs is revealed by its public outputs. Incontrast to previous techniques based on reachability from secretinputs (tainting), it ...
Thumbnail

Big Data Privacy Scenarios 

Bruce, Elizabeth; Sollins, Karen; Vernon, Mona; Weitzner, Danny (2015-10-01)
This paper is the first in a series on privacy in Big Data. As an outgrowth of a series of workshops on the topic, the Big Data Privacy Working Group undertook a study of a series of use scenarios to highlight the challenges ...
Thumbnail

Quantitative Information-Flow Tracking for C and Related Languages 

McCamant, Stephen; Ernst, Michael D. (2006-11-17)
We present a new approach for tracking programs' use of data througharbitrary calculations, to determine how much information about secretinputs is revealed by public outputs. Using a fine-grained dynamicbit-tracking ...
Thumbnail

Privacy and Security Risks for National Health Records Systems 

Alawaji, Ahmed; Sollins, Karen (2018-01-24)
A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security ...
Thumbnail

Distribution Volume Tracking on Privacy-Enhanced Wireless Grid 

Uzuner, Ozlem (2004-07-25)
In this paper, we discuss a wireless grid in which users are highly mobile, and form ad-hoc and sometimes short-lived connections with other devices. As they roam through networks, the users may choose to employ ...
Thumbnail

Information Slicing: Anonymity Using Unreliable Overlays 

Katti, Sachin; Cohen, Jeffrey; Katabi, Dina (2007-02-23)
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. ...
Thumbnail

Perfect Implementation of Normal-Form Mechanisms 

Izmalkov, Sergei; Lepinski, Matt; Micali, Silvio (2005)
Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Discover

AuthorErnst, Michael D. (2)McCamant, Stephen (2)Sollins, Karen (2)Alawaji, Ahmed (1)Bruce, Elizabeth (1)Cohen, Jeffrey (1)Izmalkov, Sergei (1)Katabi, Dina (1)Katti, Sachin (1)Lepinski, Matt (1)... View MoreSubject
Privacy (7)
Confidentiality (2)Implicit flows (2)Information disclosure (2)Memcheck (2)Security (2)Tainting (2)Valgrind (2)AI (1)Big Data (1)... View MoreDate Issued2010 - 2018 (2)2004 - 2009 (5)Has File(s)Yes (7)

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries homeMIT Libraries logo

Find us on

Twitter Facebook Instagram YouTube RSS

MIT Libraries navigation

SearchHours & locationsBorrow & requestResearch supportAbout us
PrivacyPermissionsAccessibility
MIT
Massachusetts Institute of Technology
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.