Sciweavers

3451 search results - page 74 / 691
» Collaborative attack modeling
Sort
View
IR
2006
13 years 9 months ago
A study of mixture models for collaborative filtering
Collaborative filtering is a general technique for exploiting the preference patterns of a group of users to predict the utility of items for a particular user. Three different co...
Rong Jin, Luo Si, Chengxiang Zhai
COLCOM
2009
IEEE
14 years 1 months ago
Towards a framework for group-centric secure collaboration
—The concept of groups is a natural aspect of most collaboration scenarios. Group-Centric Secure Information Sharing models (g-SIS) have been recently proposed in which users and...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
ISW
2010
Springer
13 years 7 months ago
Privilege Escalation Attacks on Android
Abstract. Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented man...
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeg...
EUROCRYPT
1998
Springer
14 years 1 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
SWAP
2008
13 years 10 months ago
Collaborative Enterprise Integrated Modelling
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents (a subset of) the aspects relevant to the a...
Marco Rospocher, Chiara Ghidini, Luciano Serafini,...