Sciweavers

1191 search results - page 201 / 239
» Online Games and Security
Sort
View
109
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 27 days ago
The Physical World as a Virtual Reality
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the ph...
Brian Whitworth
ISI
2008
Springer
15 years 24 days ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
112
Voted
EUROSYS
2008
ACM
15 years 10 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
100
Voted
DIM
2009
ACM
15 years 7 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
107
Voted
SOUPS
2009
ACM
15 years 7 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov