Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Ehab ElSalamouny"'
Autor:
Ehab ElSalamouny, Catuscia Palamidessi
Publikováno v:
2020 IEEE European Symposium on Security and Privacy (EuroS&P)
EuroS&P
EuroS&P
The iterative Bayesian update (IBU) and the matrix inversion (INV) are the main methods to retrieve the original distribution from noisy data resulting from the application of privacy protection mechanisms. We show that the foundations of IBU establi
Publikováno v:
International Journal of Computer Network and Information Security. 9:1-10
Autor:
Sébastien Gambs, Ehab ElSalamouny
Publikováno v:
International Journal of Information Security. 17:613-630
Users of location-based services are highly vulnerable to privacy risks since they need to disclose, at least partially, their locations to benefit from these services. One possibility to limit these risks is to obfuscate the location of a user by ad
Publikováno v:
Proceedings on Privacy Enhancing Technologies
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2017, 2017 (4), pp.308-328. ⟨10.1515/popets-2017-0051⟩
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2017, 2017 (4), pp.308-328. 〈10.1515/popets-2017-0051〉
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 4, Pp 308-328 (2017)
Proceedings on Privacy Enhancing Technologies, 2017, 2017 (4), pp.308-328. ⟨10.1515/popets-2017-0051⟩
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2017, 2017 (4), pp.308-328. ⟨10.1515/popets-2017-0051⟩
Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2017, 2017 (4), pp.308-328. 〈10.1515/popets-2017-0051〉
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 4, Pp 308-328 (2017)
Proceedings on Privacy Enhancing Technologies, 2017, 2017 (4), pp.308-328. ⟨10.1515/popets-2017-0051⟩
The continuously increasing use of location-based services poses an important threat to the privacy of users. A natural defense is to employ an obfuscation mechanism, such as those providing geo-indistinguishability, a framework for obtaining formal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71840b9007caafd396ff3f4b6f59351b
https://hal.inria.fr/hal-01422842
https://hal.inria.fr/hal-01422842
Publikováno v:
Horizons of the Mind. A Tribute to Prakash Panangaden
van Breugel, Franck and Kashefi, Elham and Palamidessi, Catuscia and Rutten, Jan. Horizons of the Mind. A Tribute to Prakash Panangaden, 8464, Springer International Publishing, pp.292-318, 2014, Lecture Notes in Computer Science, 978-3-319-06879-4. ⟨10.1007/978-3-319-06880-0_16⟩
Lecture Notes in Computer Science ISBN: 9783319068794
Horizons of the Mind
van Breugel, Franck and Kashefi, Elham and Palamidessi, Catuscia and Rutten, Jan. Horizons of the Mind. A Tribute to Prakash Panangaden, 8464, Springer International Publishing, pp.292-318, 2014, Lecture Notes in Computer Science, 978-3-319-06879-4. ⟨10.1007/978-3-319-06880-0_16⟩
Lecture Notes in Computer Science ISBN: 9783319068794
Horizons of the Mind
International audience; Differential privacy is a notion of privacy that was initially designed for statistical databases, and has been recently extended to a more general class of domains. Both differential privacy and its generalized version can be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19b34985368a08e3adff8c15aef1b75b
https://hal.inria.fr/hal-01006380/document
https://hal.inria.fr/hal-01006380/document
Autor:
Ehab ElSalamouny, Vladimiro Sassone
Publikováno v:
Advances in Security of Information and Communication Networks
Advances in Security of Information and Communication Networks, Sep 2013, Cairo, Egypt. pp.111-121, ⟨10.1007/978-3-642-40597-6_9⟩
Communications in Computer and Information Science ISBN: 9783642405969
SecNet
Advances in Security of Information and Communication Networks, Sep 2013, Cairo, Egypt. pp.111-121, ⟨10.1007/978-3-642-40597-6_9⟩
Communications in Computer and Information Science ISBN: 9783642405969
SecNet
International audience; In modern global networks, principals usually have incomplete information about each other. Therefore trust and reputation frameworks have been recently adopted to maximise the security level by basing decision making on estim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::715b4443ef5b1066fc8470b2c68fb891
https://hal.inria.fr/hal-00831401/document
https://hal.inria.fr/hal-00831401/document
Publikováno v:
2nd Conference on Principles of Security and Trust (POST 2013)
2nd Conference on Principles of Security and Trust (POST 2013), Mar 2013, Rome, Italy. pp.41-62, ⟨10.1007/978-3-642-36830-1_3⟩
Lecture Notes in Computer Science ISBN: 9783642368295
POST
2nd Conference on Principles of Security and Trust (POST 2013), Mar 2013, Rome, Italy. pp.41-62, ⟨10.1007/978-3-642-36830-1_3⟩
Lecture Notes in Computer Science ISBN: 9783642368295
POST
International audience; The notion of differential privacy has emerged in the area of statistical databases as a measure of protection of the participants' sensitive information, which can be compromised by selected queries. Differential privacy is u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5f4fff46fbbb80d235c64a7dd1cf913e
https://inria.hal.science/hal-00760735v2/document
https://inria.hal.science/hal-00760735v2/document
Publikováno v:
Trustworthly Global Computing ISBN: 9783642156397
TGC
TGC
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either 'honest' or 'corrupted.' This paper generalises this analysis so that each member is assumed to maliciously disclose the identity of other nodes with
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::195585d0ed63413034362e0bc2050032
https://eprints.soton.ac.uk/268594/
https://eprints.soton.ac.uk/268594/
Publikováno v:
Formal Aspects in Security and Trust ISBN: 9783642124587
Formal Aspects in Security and Trust
Formal Aspects in Security and Trust
We analyse the Crowds anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Under such conditions we study, reformulate and extend Reiter and Rubin’s notion of probabl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::63de1bb9b23ed9bb95a17731d1a7f63a
https://eprints.soton.ac.uk/267666/
https://eprints.soton.ac.uk/267666/
Publikováno v:
ElSalamouny, E, Nielsen, M & Sassone, V 2010, ' HMM-based Trust Model ', Lecture Notes in Computer Science, vol. 5983, pp. 21-35 . https://doi.org/10.1007/978-3-642-12459-4_3
Formal Aspects in Security and Trust ISBN: 9783642124587
Formal Aspects in Security and Trust
Formal Aspects in Security and Trust ISBN: 9783642124587
Formal Aspects in Security and Trust
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the principals or incorporate the notion of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2fda2a1b5c6a3cc91d0de02709b30836
https://eprints.soton.ac.uk/267669/
https://eprints.soton.ac.uk/267669/