Sciweavers

90 search results - page 9 / 18
» A Decision Theoretic Approach to Data Leakage Prevention
Sort
View
ACMSE
2009
ACM
13 years 5 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
AINA
2010
IEEE
14 years 16 days ago
Active Data Selection for Sensor Networks with Faults and Changepoints
Abstract—We describe a Bayesian formalism for the intelligent selection of observations from sensor networks that may intermittently undergo faults or changepoints. Such active d...
Michael A. Osborne, Roman Garnett, Stephen J. Robe...
ATAL
2004
Springer
14 years 26 days ago
Agents Swarming in Semantic Spaces to Corroborate Hypotheses
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to supp...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
JUCS
2010
162views more  JUCS 2010»
13 years 5 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
MOBICOM
1999
ACM
13 years 11 months ago
Adaptive Protocols for Information Dissemination in Wireless Sensor Networks
In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation), that efficiently disseminates information among sensors ...
Wendi Rabiner Heinzelman, Joanna Kulik, Hari Balak...