Sciweavers

516 search results - page 23 / 104
» Comparing Two Information Flow Security Properties
Sort
View
POPL
2006
ACM
16 years 6 days ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
IPAW
2010
14 years 9 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
IJISEC
2008
119views more  IJISEC 2008»
14 years 12 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
CHI
2007
ACM
15 years 3 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
PAMI
2010
185views more  PAMI 2010»
14 years 10 months ago
Evaluating Stability and Comparing Output of Feature Selectors that Optimize Feature Subset Cardinality
—Stability (robustness) of feature selection methods is a topic of recent interest, yet often neglected importance, with direct impact on the reliability of machine learning syst...
Petr Somol, Jana Novovicová