Sciweavers

3544 search results - page 69 / 709
» Information Security in Open Systems
Sort
View
ISI
2006
Springer
14 years 11 months ago
Inferring Privacy Information from Social Networks
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...
Jianming He, Wesley W. Chu, Zhenyu Liu
AAMAS
2006
Springer
14 years 11 months ago
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested and when trusted to perform an action for another...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
100
Voted
CCS
2004
ACM
15 years 4 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
SIGCOMM
2009
ACM
15 years 5 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
CCS
2007
ACM
15 years 5 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu