Sciweavers

516 search results - page 25 / 104
» Comparing Two Information Flow Security Properties
Sort
View
241
Voted
SACMAT
2011
ACM
14 years 6 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
COMPSAC
2009
IEEE
15 years 10 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
128
Voted
FOSAD
2000
Springer
15 years 7 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
141
Voted
COMSWARE
2007
IEEE
15 years 10 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri
114
Voted
TIME
2000
IEEE
15 years 8 months ago
A Visualization of Medical Therapy Plans Compared to Gantt and PERT Charts
Medical therapy planning shares a number of properties of project management. It is, however, different in a few very important aspects — most notably, the more complex notion o...
Robert Kosara, Silvia Miksch