Sciweavers

2281 search results - page 334 / 457
» Security Patterns and Secure Systems Design
Sort
View
WISEC
2010
ACM
15 years 11 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
121
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
On the Eyeshots of BGP Vantage Points
—The publicly available BGP vantage points (VPs) have been heavily used by the research community to build the Internet autonomous system (AS) level topology, which is a key inpu...
Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bi...
133
Voted
CIKM
2009
Springer
15 years 10 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
OOPSLA
2009
Springer
15 years 10 months ago
Typestate-oriented programming
Objects model the world, and state is fundamental to a faithful modeling. Engineers use state machines to understand and reason about state transitions, but programming languages ...
Jonathan Aldrich, Joshua Sunshine, Darpan Saini, Z...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 10 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...