Sciweavers

352 search results - page 6 / 71
» Information Disclosure as a Means to Security
Sort
View
93
Voted
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 3 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
181
Voted
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 17 days ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
16 years 19 days ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
96
Voted
HICSS
2007
IEEE
215views Biometrics» more  HICSS 2007»
15 years 6 months ago
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit
Information Technology governance (ITG) which was a relatively new concept in the late 1990s, has gained importance in the 21st century due to factors namely the collapse of Enron...
Mathew Nicho, Brian Cusack
200
Voted
ITCC
2005
IEEE
15 years 6 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch