Sciweavers

352 search results - page 26 / 71
» Information Disclosure as a Means to Security
Sort
View
90
Voted
CCS
2004
ACM
15 years 5 months ago
Formally verifying information flow type systems for concurrent and thread systems
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
Gilles Barthe, Leonor Prensa Nieto
105
Voted
ISI
2007
Springer
15 years 6 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
126
Voted
RECSYS
2009
ACM
15 years 7 months ago
Rating aggregation in collaborative filtering systems
Recommender systems based on user feedback rank items by aggregating users’ ratings in order to select those that are ranked highest. Ratings are usually aggregated using a weig...
Florent Garcin, Boi Faltings, Radu Jurca, Nadine J...
118
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
USENIX
2007
15 years 2 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...