Sciweavers

650 search results - page 49 / 130
» Privacy in Non-private Environments
Sort
View
COMSWARE
2006
IEEE
15 years 3 months ago
The SIMPLE presence and event architecture
— Current presence systems offer only basic services that are mostly useful for dial-up environments, while event services have not seen widespread deployment. We describe the SI...
Henning Schulzrinne
ESORICS
2009
Springer
15 years 10 months ago
Isolating JavaScript with Filters, Rewriting, and Wrappers
Abstract. We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implemented properly, filters can prevent dangerous code from loading into t...
Sergio Maffeis, John C. Mitchell, Ankur Taly
AGENTS
1997
Springer
15 years 1 months ago
Increasing Believability in Animated Pedagogical Agents
Animated pedagogical agents o er great promise for knowledge-based learning environments. In addition to coupling feedback capabilities with a strong visual presence, these agents...
James C. Lester, Brian A. Stone
CSFW
2012
IEEE
13 years 6 days ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
CCS
2009
ACM
15 years 10 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...