Sciweavers

2403 search results - page 391 / 481
» Cyberinsurance in IT Security Management
Sort
View
ISI
2006
Springer
13 years 8 months ago
DrillSim: A Simulation Framework for Emergency Response Drills
Responding to natural or man-made disasters in a timely and effective manner can reduce deaths and injuries, contain or prevent secondary disasters, and reduce the resulting econom...
Vidhya Balasubramanian, Daniel Massaguer, Sharad M...
ISI
2006
Springer
13 years 8 months ago
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
Clayton T. Morrison, Paul R. Cohen
JAR
2006
107views more  JAR 2006»
13 years 8 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy
ARESEC
2011
110views more  ARESEC 2011»
12 years 8 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
WWW
2009
ACM
14 years 8 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...