Sciweavers

627 search results - page 119 / 126
» Collaborative data privacy for the web
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
SWS
2004
ACM
14 years 1 months ago
A formal semantics for P3P
The Platform for Privacy Preferences (P3P), developed by the W3C, provides an XML-based language for websites to encode their datacollection and data-use practices in a machine-re...
Ting Yu, Ninghui Li, Annie I. Antón
AGENTS
1999
Springer
14 years 1 days ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
ACSAC
2004
IEEE
13 years 11 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
CORR
2002
Springer
131views Education» more  CORR 2002»
13 years 7 months ago
A Connection-Centric Survey of Recommender Systems Research
Recommender systems attempt to reduce information overload and retain customers by selecting a subset of items from a universal set based on user preferences. While research in rec...
Saverio Perugini, Marcos André Gonça...