Sciweavers

447 search results - page 6 / 90
» Rule Languages for Security and Privacy in Cooperative Syste...
Sort
View
OTM
2005
Springer
15 years 3 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
CIKM
2009
Springer
15 years 2 months ago
A novel approach for privacy mining of generic basic association rules
Data mining can extract important knowledge from large data collections - but sometimes these collections are split among various parties. Privacy concerns may prevent the parties...
Moez Waddey, Pascal Poncelet, Sadok Ben Yahia
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 2 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
INFOCOM
2012
IEEE
13 years 15 days ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
14 years 9 months ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini