Sciweavers

516 search results - page 25 / 104
» Comparing Two Information Flow Security Properties
Sort
View
232
Voted
SACMAT
2011
ACM
14 years 5 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
109
Voted
COMPSAC
2009
IEEE
15 years 9 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
120
Voted
FOSAD
2000
Springer
15 years 6 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
130
Voted
COMSWARE
2007
IEEE
15 years 9 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri
108
Voted
TIME
2000
IEEE
15 years 7 months ago
A Visualization of Medical Therapy Plans Compared to Gantt and PERT Charts
Medical therapy planning shares a number of properties of project management. It is, however, different in a few very important aspects — most notably, the more complex notion o...
Robert Kosara, Silvia Miksch