Sciweavers

831 search results - page 51 / 167
» A Security Concept for OLAP
Sort
View
CCS
2009
ACM
14 years 4 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
DRM
2009
Springer
14 years 4 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriļ¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
CCS
2003
ACM
14 years 3 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
JUCS
2010
114views more  JUCS 2010»
13 years 4 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 4 months ago
Teaching the principles of the hacker curriculum to undergraduates
The ā€œHacker Curriculumā€ exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is deļ¬ned by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto