A body of knowledge containing laws, axioms and provable theories relating to some aspect of system security.
biblio
Submitted by awhitesell on Mon, 04/03/2017 - 4:17pm
biblio
Submitted by awhitesell on Mon, 04/03/2017 - 4:13pm
biblio
Submitted by awhitesell on Mon, 04/03/2017 - 4:08pm
biblio
Submitted by awhitesell on Mon, 04/03/2017 - 4:01pm
event
Submitted by Anonymous on Mon, 03/20/2017 - 2:57pm
CALL FOR PAPERS
13th European Dependable Computing Conference (EDCC 2017)
Geneva, Switzerland | 4-8 September 2017 | http://edcc2017.unige.ch/
file
ABSTRACT: As 2017 begins, are we entering a time of crisis or a time of opportunity for individual privacy? Law enforcement demands for consumer data continue to grow and surveillance by intelligence agencies continues to drive civil liberties debates. Online tracking for analytic
file
ABSTRACT: In this talk, we will give a friendly introduction to Differential Privacy, a rigorous methodology for analyzing data subject to provable privacy guarantees, that has recently been widely deployed in several settings.
file
ABSTRACT: Cyber-physical systems (CPS) are used to monitor and control real-world systems, ranging from implantable life-critical medical devices to large safety-critical infrastructures.