Sciweavers

6812 search results - page 102 / 1363
» Detection of Information Flows
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 8 months ago
Operationalised Business Intelligence: Knowledge Sharing with an Enterprise Ambition at the Amsterdam-Amstelland Police Departme
In this article we describe the operationalised Business Intelligence (BI) environment of the Amsterdam-Amstelland Police Department (AAPD) as it presented itself in the spring of...
Stijn Viaene, Luc Lutin, Steven De Hertogh
ICSE
2001
IEEE-ACM
15 years 6 months ago
A Scenario-Driven Approach to Traceability
Design traceability has been widely recognized as being an integral aspect of software development. In the past years this fact has been amplified due to the increased use of lega...
Alexander Egyed
97
Voted
SIGMETRICS
2002
ACM
117views Hardware» more  SIGMETRICS 2002»
15 years 1 months ago
Context-aware TCP/IP
Abstract-This paper discusses the design and evaluation of CATNIP, a ContextAware Transport/Network Internet Protocol for the Web. This integrated protocol uses application-layer k...
Carey L. Williamson, Qian Wu
CCR
2008
118views more  CCR 2008»
15 years 1 months ago
A generic language for application-specific flow sampling
Flow records gathered by routers provide valuable coarse-granularity traffic information for several measurement-related network applications. However, due to high volumes of traf...
Harsha V. Madhyastha, Balachander Krishnamurthy
CSFW
2004
IEEE
15 years 5 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic