Sciweavers

352 search results - page 50 / 71
» Information Disclosure as a Means to Security
Sort
View
100
Voted
SECURWARE
2008
IEEE
15 years 7 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
111
Voted
DMIN
2006
115views Data Mining» more  DMIN 2006»
15 years 1 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
129
Voted
DICTA
2009
15 years 1 months ago
Video Surveillance: Legally Blind?
This paper shows that most surveillance cameras fall well short of providing sufficient image quality, in both spatial resolution and colour reproduction, for the reliable identifi...
Peter Kovesi
110
Voted
SACMAT
2010
ACM
14 years 11 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
221
Voted
POPL
2006
ACM
16 years 26 days ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam