Shyam K. Gupta

Learn More
AIM The aim of this study was to highlight various anomalies associated with undescended testis and to determine how much work up is necessary for this condition. MATERIAL AND METHODS The study was conducted in the department of Pediatric Surgery SKIMS Srinagar, Kashmir. All patients between 0-14 years of age who attended out patient department (OPD) from(More)
The concept of honeypot has been explored by many researchers in the network domain. We have proposed database honeypots and have given its architecture[5]. The use of such a honeypot is to identify potential attackers before an attack actually takes place. The privacy policy as advocated in [6] is expected to deny the access to a suspected user. However,(More)
Gastrointestinal perforations have been surgical problem since the time immortal. Scientists have found evidence of gastrointestinal perforations in Egyptian mummies. Perforation is said to occur once a pathology which extends through the full thickness of the hollow viscus leading to peritoneal contamination with intraluminal contents. Perforation can(More)
When a privacy violation is detected the intension behind the violation is revealed. We refer to this as a malafide intension and the information revealed as the target. The target can be expressed using an SQL-like syntax. In sophisticated privacy attacks the target of the attack may not have been directly accessed but inferred from other pieces of(More)
Honeypots have been studied in the network domain for detection and information collection against external threats in the past few years. They lure a potential attacker by simulating resources having vulnerabilities and observing the behavior of a potential attacker to identify him before a damaging attack takes place. A lot of work has been done in the(More)
In presence of a robust privacy infrastructure, an attacker can fulfil his purpose (malafide intension) only by masquerading it with bonafide purposes besides other authentication parameters. We address the issue of masquerading of purpose for a malafide intension by defining the mapping from a malafide intension to bonafide purposes in this paper. An(More)
Online advertising is aimed to promote and sell products and services of various companies in the global market through internet. In 2005, it was estimated that companies spent $10B in web advertisements, and it is expected to grow by 25-30% in the next few years. The advertisements can be displayed in the search results as sponsored links, on the web(More)
Non Disclosure Agreements(NDAs) in real life are typically used whenever there is transfer of private or confidential information from one organization to another. The provider organization can not have any control over privacy mechanisms of the receiving organization. The privacy policy work so far has addressed itself for preventing privacy violation(More)