Sciweavers

57 search results - page 12 / 12
» Assessment of Enterprise Information Security - The Importan...
Sort
View
CSFW
2009
IEEE
14 years 8 days ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
SAC
2011
ACM
12 years 8 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty