Sciweavers

352 search results - page 20 / 71
» Information Disclosure as a Means to Security
Sort
View
82
Voted
COMCOM
2004
83views more  COMCOM 2004»
15 years 9 days ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
84
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 5 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 4 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
101
Voted
CCS
2005
ACM
15 years 6 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
108
Voted
SIGADA
2004
Springer
15 years 5 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton