Sciweavers

516 search results - page 23 / 104
» Comparing Two Information Flow Security Properties
Sort
View
POPL
2006
ACM
14 years 9 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
IPAW
2010
13 years 6 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
IJISEC
2008
119views more  IJISEC 2008»
13 years 8 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
CHI
2007
ACM
14 years 24 days ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
PAMI
2010
185views more  PAMI 2010»
13 years 7 months ago
Evaluating Stability and Comparing Output of Feature Selectors that Optimize Feature Subset Cardinality
—Stability (robustness) of feature selection methods is a topic of recent interest, yet often neglected importance, with direct impact on the reliability of machine learning syst...
Petr Somol, Jana Novovicová