Sciweavers

3451 search results - page 74 / 691
» Collaborative attack modeling
Sort
View
IR
2006
14 years 12 months ago
A study of mixture models for collaborative filtering
Collaborative filtering is a general technique for exploiting the preference patterns of a group of users to predict the utility of items for a particular user. Three different co...
Rong Jin, Luo Si, Chengxiang Zhai
COLCOM
2009
IEEE
15 years 4 months ago
Towards a framework for group-centric secure collaboration
—The concept of groups is a natural aspect of most collaboration scenarios. Group-Centric Secure Information Sharing models (g-SIS) have been recently proposed in which users and...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
ISW
2010
Springer
14 years 9 months ago
Privilege Escalation Attacks on Android
Abstract. Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented man...
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeg...
EUROCRYPT
1998
Springer
15 years 4 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
SWAP
2008
15 years 1 months ago
Collaborative Enterprise Integrated Modelling
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents (a subset of) the aspects relevant to the a...
Marco Rospocher, Chiara Ghidini, Luciano Serafini,...