Sciweavers

5119 search results - page 213 / 1024
» Security Privacy
Sort
View
CSFW
2008
IEEE
15 years 11 months ago
Hyperproperties
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperties, introduced here, are sets of properties. Hyperproperties can express securi...
Michael R. Clarkson, Fred B. Schneider
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 11 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
IEEEARES
2007
IEEE
15 years 10 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
P2P
2010
IEEE
136views Communications» more  P2P 2010»
15 years 2 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
15 years 9 months ago
Public Attitudes towards a National Identity "Smart Card: " Privacy and Security Concerns
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Brille