Sciweavers

3395 search results - page 591 / 679
» Computational Differential Privacy
Sort
View
121
Voted
SAC
2009
ACM
15 years 10 months ago
Link-based event detection in email communication networks
People’s email communications can be modeled as graphs with vertices representing email accounts and edges representing email communications. Email communication data usually co...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
125
Voted
CSE
2009
IEEE
15 years 10 months ago
Towards Automating Social Engineering Using Social Networking Sites
—A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a...
Markus Huber, Stewart Kowalski, Marcus Nohlberg, S...
115
Voted
CSE
2009
IEEE
15 years 10 months ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
148
Voted
TRUST
2009
Springer
15 years 10 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
TRUST
2009
Springer
15 years 10 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...