Sciweavers

464 search results - page 70 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
106
Voted
CCS
2005
ACM
15 years 6 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
89
Voted
ICADL
2004
Springer
115views Education» more  ICADL 2004»
15 years 5 months ago
PaSE: Locating Online Copy of Scientific Documents Effectively
The need for fast and vast dissemination of research results has led a new trend such that more number of authors post their documents to personal or group Web spaces so that other...
Byung-Won On, Dongwon Lee
101
Voted
DATE
2009
IEEE
114views Hardware» more  DATE 2009»
15 years 7 months ago
Hardware aging-based software metering
Abstract—Reliable and verifiable hardware, software and content usage metering (HSCM) are of primary importance for wide segments of e-commerce including intellectual property a...
Foad Dabiri, Miodrag Potkonjak
92
Voted
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
15 years 2 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
CCS
2004
ACM
15 years 5 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...