Sciweavers

630 search results - page 113 / 126
» Acceptable internet use policy
Sort
View
CORR
2000
Springer
83views Education» more  CORR 2000»
13 years 7 months ago
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Lorrie Faith Cranor
ACSAC
2010
IEEE
13 years 5 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
TELSYS
2002
128views more  TELSYS 2002»
13 years 7 months ago
An Evaluation of Shared Multicast Trees with Multiple Cores
Native multicast routing protocols have been built and deployed using two basic types of trees: singlesource, shortest-path trees and shared, core-based trees. Core-based multicas...
Daniel Zappala, Aaron Fabbri, Virginia Mary Lo
WWW
2008
ACM
14 years 8 months ago
StYLiD: Social Information Sharing with Free Creation of Structured Linked Data
Information sharing can be effective with structured data. The Semantic Web is mainly aimed at structuring information by creating widely accepted ontologies. However, users have ...
Aman Shakya, Hideaki Takeda, Vilas Wuwongse
28
Voted
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...