Sciweavers

1779 search results - page 136 / 356
» A Formal Model of Data Privacy
Sort
View
IEEEARES
2007
IEEE
15 years 10 months ago
Applying a Tradeoff Model (TOM) to TACT
In a software system, it is inevitable that components will occasionally fail to produce acceptable results and become unavailable to serve its clients. Replication is the techniq...
Raihan Al-Ekram, Richard C. Holt, Chris Hobbs
127
Voted
ACSAC
2005
IEEE
15 years 10 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ER
2001
Springer
60views Database» more  ER 2001»
15 years 9 months ago
Tripod: A Comprehensive Model for Spatial and Aspatial Historical Objects
Abstract Spatio-temporal extensions to data models have been an active area of research for a number of years. To date, much of this work has focused on the relational data model, ...
Tony Griffiths, Alvaro A. A. Fernandes, Norman W. ...
ESORICS
2006
Springer
15 years 8 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
CSE
2009
IEEE
15 years 11 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...