Sciweavers

23 search results - page 4 / 5
» Assessing The Policy Dimension Of Information Security
Sort
View
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
13 years 5 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
ECIS
2000
13 years 7 months ago
Community Health Assessments: A Data Warehousing Approach
- The measurement and assessment of health status in communities throughout the world is a massive information technology challenge. The Comprehensive Assessment for Tracking Commu...
Donald J. Berndt, Alan R. Hevner, James Studnicki
ISI
2010
Springer
13 years 4 months ago
Measuring behavioral trust in social networks
Abstract—Trust is an important yet complex and little understood dyadic relation among actors in a social network. There are many dimensions to trust; trust plays an important ro...
Sibel Adali, Robert Escriva, Mark K. Goldberg, Myk...
SIGCOMM
2009
ACM
14 years 8 days ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
SIN
2010
ACM
13 years 3 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann