Sciweavers

1906 search results - page 232 / 382
» Data Privacy
Sort
View
NSDI
2008
15 years 6 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
AISM
2004
15 years 5 months ago
Need to Know: Security or Liability?
The `Need to Know' concept is often quoted but rarely defined in the literature. In general the principle directs that unless an individual has a specific reason to have acce...
Christopher Bolan
CCS
1994
ACM
15 years 8 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
ACSAC
2008
IEEE
15 years 10 months ago
OMOS: A Framework for Secure Communication in Mashup Applications
Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous data sources into one integrated browser environment. The hallmark of these appli...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
ICDT
2007
ACM
87views Database» more  ICDT 2007»
15 years 10 months ago
Query Evaluation on a Database Given by a Random Graph
We consider random graphs, and their extensions to random structures, with edge probabilities of the form βn−α , where n is the number of vertices, α, β are fixed and α >...
Nilesh N. Dalvi