Sciweavers

516 search results - page 25 / 104
» Comparing Two Information Flow Security Properties
Sort
View
SACMAT
2011
ACM
12 years 11 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
COMPSAC
2009
IEEE
14 years 3 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
FOSAD
2000
Springer
14 years 12 days ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
COMSWARE
2007
IEEE
14 years 3 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri
TIME
2000
IEEE
14 years 1 months ago
A Visualization of Medical Therapy Plans Compared to Gantt and PERT Charts
Medical therapy planning shares a number of properties of project management. It is, however, different in a few very important aspects — most notably, the more complex notion o...
Robert Kosara, Silvia Miksch