Sciweavers

3451 search results - page 139 / 691
» Collaborative attack modeling
Sort
View
147
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
ICWS
2009
IEEE
15 years 11 months ago
A Tool for Choreography Analysis Using Collaboration Diagrams
Analyzing interactions among peers that interact via messages is a crucial problem due to increasingly distributed nature of current software systems, especially the ones built us...
Tevfik Bultan, Chris Ferguson, Xiang Fu
124
Voted
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
15 years 3 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
FC
2010
Springer
132views Cryptology» more  FC 2010»
15 years 6 months ago
A Learning-Based Approach to Reactive Security
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the r...
Adam Barth, Benjamin I. P. Rubinstein, Mukund Sund...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 9 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...