Sciweavers

3193 search results - page 36 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
14 years 2 months ago
Antecedents to E-File Adoption: The U.S. Perspective
One of congress’ goals for 2007 was for 80% of all tax and informational returns to be filed electronically [9]. However, to date that lofty goal has fallen well short. This res...
Lemuria Carter, Ludwig Christian Schaupp, Allison ...
NSPW
2006
ACM
14 years 1 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
AMW
2011
12 years 11 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
ISI
2008
Springer
13 years 7 months ago
A Generative Model for Statistical Determination of Information Content from Conversation Threads
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 8 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...