Sciweavers

1965 search results - page 74 / 393
» Information shared by many objects
Sort
View
CSFW
2004
IEEE
15 years 1 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
AVI
2004
14 years 11 months ago
How users interact with biodiversity information using TaxonTree
Biodiversity databases have recently become widely available to the public and to other researchers. To retrieve information from these resources, users must understand the underl...
Bongshin Lee, Cynthia Sims Parr, Dana Campbell, Be...
CCS
2009
ACM
15 years 4 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
PAKDD
2009
ACM
225views Data Mining» more  PAKDD 2009»
15 years 2 months ago
Accurate Synthetic Generation of Realistic Personal Information
A large proportion of the massive amounts of data that are being collected by many organisations today is about people, and often contains identifying information like names, addre...
Peter Christen, Agus Pudjijono
OOIS
2000
Springer
15 years 1 months ago
Perspectives and Complex Aggregates
When we model a phenomenon we apply a perspective on the phenomenon. The perspective decides which properties we include in the model. It also decides how we conceive a phenomenon ...
Lars Kirkegaard Bækdal, Bent Bruun Kristense...