Sciweavers

52 search results - page 7 / 11
» A Taxonomy of Rational Attacks
Sort
View
PAKDD
2004
ACM
121views Data Mining» more  PAKDD 2004»
14 years 1 months ago
Secure Association Rule Sharing
Abstract. The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal stra...
Stanley R. M. Oliveira, Osmar R. Zaïane, Y&uu...
SKG
2006
IEEE
14 years 1 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
SEC
2008
13 years 9 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
CCS
2006
ACM
13 years 11 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
ARGMAS
2004
Springer
14 years 1 months ago
A Dialogue Game Protocol for Multi-agent Argument over Proposals for Action
We present the syntax and semantics for a multi-agent dialogue game protocol which permits argument over proposals for action. The protocol, called the Persuasive Argument for Mult...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...