Sciweavers

131 search results - page 4 / 27
» Active Data Protection with Data Journals
Sort
View
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
13 years 11 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
IEEEARES
2010
IEEE
14 years 7 days ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
GROUP
2009
ACM
14 years 1 months ago
Toward technologies that support family reflections on health
Previous research has explored how technology can motivate healthy living in social groups such as friends and coworkers. However, little research has focused on the implications ...
Andrea Grimes, Desney S. Tan, Dan Morris
SEC
2008
13 years 8 months ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
CN
2008
76views more  CN 2008»
13 years 7 months ago
Efficient path protection in bi-directional WDM systems
Bi-directional WDM transmission is a technique that allows data to be transmitted simultaneously in both directions of a fiber, with different sets of wavelength channels for each...
Ji Li, Kwan L. Yeung, Chun-Kit Chan