Sciweavers

694 search results - page 74 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ICAIL
2003
ACM
15 years 5 months ago
Developing Legal Knowledge Based Systems Through Theory Construction
Bench-Capon and Sartor have proposed that reasoning with legal cases be seen as a process of theory construction, evaluation and application. They have proposed a set of theory co...
Alison Chorley, Trevor J. M. Bench-Capon
CSFW
2007
IEEE
15 years 6 months ago
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
Heiko Mantel, Henning Sudbrock
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 9 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
CCS
2010
ACM
14 years 10 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
PERCOM
2011
ACM
14 years 6 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...