Sciweavers

739 search results - page 47 / 148
» Information Flow in Credential Systems
Sort
View
SACMAT
2011
ACM
14 years 2 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
CSREASAM
2006
15 years 1 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
WWW
2005
ACM
16 years 15 days ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 5 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
IASTEDSEA
2004
15 years 1 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao