Sciweavers

56 search results - page 3 / 12
» ieeeares 2008
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
A Critique of k-Anonymity and Some of Its Enhancements
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be repeated at least for k records. It has been shown that k-anonymity alone does...
Josep Domingo-Ferrer, Vicenç Torra
IEEEARES
2008
IEEE
15 years 4 months ago
A Preliminary Investigation of Skype Traffic Classification Using a Minimalist Feature Set
In this work, AdaBoost and C4.5, are employed for classifying Skype direct (UDP and TCP) communications from traffic log files. Pre-processing is applied to the traffic data to ex...
Duffy Angevine, A. Nur Zincir-Heywood
IEEEARES
2008
IEEE
15 years 4 months ago
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems
Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentraliz...
Maria Luisa Damiani, Claudio Silvestri, Elisa Bert...
IEEEARES
2008
IEEE
15 years 4 months ago
On the Possibility of Small, Service-Free Disk Based Storage Systems
For many storage providers, the cost of providing service calls exceeds the costs of the hardware being serviced. In this paper, we show that zeromaintenance, small disk arrays ar...
Jehan-François Pâris, Thomas J. E. Sc...