Sciweavers

360 search results - page 32 / 72
» ccs 2008
Sort
View
107
Voted
CCS
2008
ACM
15 years 6 days ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
92
Voted
CCS
2008
ACM
15 years 6 days ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
83
Voted
CCS
2008
ACM
15 years 6 days ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
100
Voted
CCS
2008
ACM
15 years 6 days ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
CGF
2002
103views more  CGF 2002»
14 years 10 months ago
Hardware Accelerated Interactive Vector Field Visualization: A level of detail approach
This paper presents an interactive global visualization technique for dense vector fields using levels of detail. We introduce a novel scheme which combines an error-controlled hi...
Udeepta Bordoloi, Han-Wei Shen