Sciweavers

167 search results - page 22 / 34
» Information Security Economics - and Beyond
Sort
View
CSFW
2002
IEEE
15 years 2 months ago
Secrecy in Multiagent Systems
We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Because secrecy requirements are closely connected with the knowledge of individua...
Joseph Y. Halpern, Kevin R. O'Neill
AGENTS
2001
Springer
15 years 2 months ago
A multi-agent system for automated genomic annotation
Massive amounts of raw data are currently being generated by biologists while sequencing organisms. Outside of the largest, high-pro le projects such as the Human Genome Project, ...
Keith Decker, Xiaojing Zheng, Carl Schmidt
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 3 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
ESORICS
2008
Springer
14 years 11 months ago
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
The rapid expansion of Internet based services has created opportunities for ICT firms to collect and use, in an unauthorized way, information about individuals (e.g. customers, pa...
Athanassios N. Yannacopoulos, Costas Lambrinoudaki...
SEC
2008
14 years 11 months ago
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models
The Session Initiation Protocol (SIP) has been used widely for Voice over IP (VoIP) service because of its potential advantages, economical efficiency and call setup simplicity. Ho...
Dongwon Seo, Heejo Lee, Ejovi Nuwere