| Title: |
Reliably determining data leakage in the presence of strong attackers |
| Article URLs: |
|
| Alternative Article URLs: |
|
| Authors: |
Riccardo Bortolameotti |
|
| Andreas Peter |
|
| Maarten H. Everts |
|
| Willem Jonker |
-
University of Twente
-
EIT Digital
|
| Pieter H. Hartel |
|
| Sharing: |
Not able to share produced artifacts
|
| Verification: |
Authors have
verified
information
|
| Artifact Evaluation Badge: |
none
|
| Artifact URLs: |
|
| Artifact Correspondence Email Addresses: |
|
| NSF Award Numbers: |
|
| DBLP Key: |
conf/acsac/BortolameottiPE16
|
| Author Comments: |
The dataset we used for the results in 8.2 contained sensitive information, therefore we cannot share it. The code is not available anymore, however it was a script implementing the formula discussed in Section 7.3. |