Sciweavers

2652 search results - page 21 / 531
» When Information Improves Information Security
Sort
View
COMAD
2009
14 years 10 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy
64
Voted
CCS
2009
ACM
15 years 4 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
ETRICS
2006
15 years 1 months ago
Possibilistic Information Flow Control in MAKS and Action Refinement
Abstract. Formal methods emphasizes the need for a top-down approach when developing large reliable software systems. Refinements are map step by step abstract algebraic specificat...
Dieter Hutter
CCS
2008
ACM
14 years 11 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
80
Voted
CHI
2009
ACM
15 years 10 months ago
What do you see when you're surfing?: using eye tracking to predict salient regions of web pages
An understanding of how people allocate their visual attention when viewing Web pages is very important for Web authors, interface designers, advertisers and others. Such knowledg...
Georg Buscher, Edward Cutrell, Meredith Ringel Mor...