Sciweavers

1564 search results - page 226 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
PET
2004
Springer
15 years 3 months ago
Reputable Mix Networks
We define a new type of mix network that offers a reduced form of robustness: the mixnet can prove that every message it outputs corresponds to an input submitted by a player wit...
Philippe Golle
ESORICS
2003
Springer
15 years 3 months ago
A Toolkit for Managing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
Michael Backes, Birgit Pfitzmann, Matthias Schunte...
ACSAC
2002
IEEE
15 years 2 months ago
A Toolkit for Detecting and Analyzing Malicious Software
In this paper we present PEAT: The Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to ex...
Michael Weber, Matthew Schmid, Michael Schatz, Dav...
COMPSAC
2009
IEEE
15 years 2 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...