Sciweavers

352 search results - page 52 / 71
» Information Disclosure as a Means to Security
Sort
View
110
Voted
SIGIR
2009
ACM
15 years 7 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
118
Voted
CCS
2004
ACM
15 years 6 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
104
Voted
CIMCA
2008
IEEE
15 years 7 months ago
Analysing Boundary Objects to Develop Results that Support Business Goals
In this study of eight outsourcing projects, we seek to understand the mechanisms that companies put in place to coordinate knowledge work across their boundaries. We find that m...
María Laura Ponisio, Peter Vruggink
106
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 6 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
94
Voted
IWIA
2005
IEEE
15 years 6 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott