Title: |
Reliably determining data leakage in the presence of strong attackers |
Article URLs: |
|
Alternative Article URLs: |
|
Authors: |
Riccardo Bortolameotti |
|
Andreas Peter |
|
Maarten H. Everts |
|
Willem Jonker |
-
University of Twente
-
EIT Digital
|
Pieter H. Hartel |
|
Sharing: |
Not able to share produced artifacts
|
Verification: |
Authors have
verified
information
|
Artifact Evaluation Badge: |
none
|
Artifact URLs: |
|
Artifact Correspondence Email Addresses: |
|
NSF Award Numbers: |
|
DBLP Key: |
conf/acsac/BortolameottiPE16
|
Author Comments: |
The dataset we used for the results in 8.2 contained sensitive information, therefore we cannot share it. The code is not available anymore, however it was a script implementing the formula discussed in Section 7.3. |