RESEARCH PAPERS

data leakage algorithm in software engineering




DATA LEAKAGE DETECTION USING K-ANONYMITY ALGORITHM
free download

ABSTRACT A data distributor or a Businees Process Outsourcing (BPO) company distributes sensitive data to a set of trusted companies or a set of agents (third parties). Some data can be leaked and found in an unauthorized place. The distributor will be 

Quantitative Evaluation of State-Preserving Leakage Reduction Algorithm for L1 Data Caches
free download

Summary As the transistor feature sizes and threshold voltages reduce, leakage energy consumption has become an inevitable issue for high-performance microprocessor designs. Since on-chip caches are major contributors of the leakage, a number of researchers have 

Data leakage detection
free download

1 Data Leakage Detection  We start in Section 2 by introducing our problem setup and the notation we use. In the first part of the paper, Sections 4 and 5, we present a model for calculating guilt probabilities in cases of data leakage. 

Correlation power analysis with a leakage model
free download

 word has an average Hamming weight µH = m/2 and a variance s2 H = m/4. It is generally assumed that the data leakage through the  For instance, when considering the first AddRoundKey function at the begin- ning of the AES algorithm embedded on an 8-bit processor, it is 

MIST: An efficient, randomized exponentiation algorithm for resisting power analysis
free download

 There are many different ways in which to program the random selection of the so-called divisors of the algorithm.  As with all algorithms, poor implementation can lead to data leakage. The main sources of such weakness have been identified. 

A model for data leakage detection
free download



Collaborative fingerprint authentication by smart card and a trusted host
free download

 the time complexity ,and reduce the data leakage possibility in our method. 2 Fingerprint Authentication Basic and its Application in Our Project In our work, fingerprint comparison is chosen as the biometrics authentication tool for its maturity in terms of algorithm availability and 

I Know What You Did Last Summer: risks of location data leakage in mobile and social computing
free download

 also discuss some techniques and principles that allow location data sharing and location based services (LBSs) while minimizing data leakage.  Several pioneering efforts in this area have explored whether an algorithm can discover users? meaningful places from spatial data 

HIDE: an infrastructure for efficiently protecting information leakage on the address bus
free download

 3.2 Critical Data Leakage via Value-dependent Conditional Branches Apart from the above potential problem of revealing IP, CFG matching can also potentially compromise a secret key and leak  The following example assumes that the algorithm used is known beforehand 74 

Privacy-preserving public auditing for data storage security in cloud computing
free download

Unauthorized data leakage still remains a problem due to the potential exposure of encryption keys.  A bilinear map is a map e : G1 × G2 ? GT with the following properties [15]: 1) Computable: there exists an efficiently computable algorithm for computing e; 2) Bilinear: for all u 

Side-channel analysis
free download

 with a secret-key algorithm, it is possible to distinguish the areas sensitive to input messages from the constant areas that correspond to the key schedule. Figure 2: Information leakage 2 Information Leakage Model The characterisation of data leakage (namely, finding the 

A distributed k-secure sum protocol for secure multi-party computations
free download

 over pre- vious protocols [11] where the probability of data leakage by two colluding parties was P1k = (2/n-1)k where k is the num- ber of segments and n is the number of parties. Now, to calculate the communication complexity of the dk-Secure algorithm, we know that each 

Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation
free download

 8. End of algorithm. 3.3 PERFORMANCE ANALYSIS OF CK- SECURE SUM PROTOCOL In this protocol each data segment is secret of the party and chosen with its own way.  Thus the probability of data leakage by two colluder parties to a middle party is zero. 

How to compute in the presence of leakage
free download

 and by Juma and Vhalis [7], who both transform an input algorithm P (expressed as a Turing Machine or a boolean circuit) into an algorithm P , which  It is assumed that there is no data leakage from the randomness generated and the computation performed inside of the device. 

M-score: estimating the potential damage of data leakage incident by assigning misuseability weight
free download

and the results outperformed the syntax-centric method. Other researchers dealt with general intrusion detection in databases rather than focusing on data leakage.  4. THE M-Score MEASURE To measure the misuseability weight, we propose a new algorithm - the M-Score. 

REVIEW ON DATA LEAKAGE DETECTION.
free download

 Such ap-proaches prevent in some sense data leakage by sharing information only with trusted parties.  We would like thank Paul Heymann for his help with running the non- polynomial guilt model detection algorithm that we present in the Appendix of on a Hadoop cluster. 


FREE ENGINEERING RESEARCH PAPERS