Sciweavers

5255 search results - page 200 / 1051
» Formal Methods for Privacy
Sort
View
104
Voted
ECRIME
2007
15 years 7 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
135
Voted
SAJ
2002
97views more  SAJ 2002»
15 years 3 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
124
Voted
IADIS
2004
15 years 5 months ago
Collaborative Task Scheduling Method Based on Social Network Analysis for Cellphone Application
This paper proposes a collaborative approach for personal task management which is modeled as an alliance model. Alliance model is based on information sharing and collaboration o...
Ikki Ohmukai, Hideaki Takeda
FMCAD
2000
Springer
15 years 7 months ago
Monitor-Based Formal Specification of PCI
Bus protocols are hard to specify correctly, and yet it is often critical and highly beneficial that their specifications are correct, complete, and unambiguous. The informal speci...
Kanna Shimizu, David L. Dill, Alan J. Hu
122
Voted
ISARCS
2010
156views Hardware» more  ISARCS 2010»
15 years 5 months ago
A Road to a Formally Verified General-Purpose Operating System
Methods of formal description and verification represent a viable way for achieving fundamentally bug-free software. However, in reality only a small subset of the existing operati...
Martin Decký