Sciweavers

131 search results - page 22 / 27
» Active Data Protection with Data Journals
Sort
View
ISSA
2004
13 years 9 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
PDPTA
2004
13 years 9 months ago
A Case for Queue-to-Queue, Back-Pressure-Based Congestion Control for Grid Networks
Standard "new-Reno" TCP faces some performance limitations in very high throughput IP WAN networks, (e.g., computing grids) due to a long end-to-end congestion feedback l...
Marc Herbert, Pascale Vicat-Blanc Primet
CCS
2010
ACM
13 years 7 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
JLBS
2007
75views more  JLBS 2007»
13 years 7 months ago
Designing privacy-aware mobility pricing systems based on user perspective
Mobility-pricing is one of the avenues leading to the information highway. Using a combination of positioning, communication and information processing, automobile insurance can b...
Muhammad Usman Iqbal, Samsung Lim
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 8 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik