Sciweavers

578 search results - page 26 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
WWW
2010
ACM
14 years 2 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
ITNG
2006
IEEE
14 years 1 months ago
A Study on the Security of Privacy Homomorphism
Informally, Privacy Homomorphism (PH) refers to encryption schemes with a homomorphic property allowing to obtain Ek(a + b) or Ek(a × b) from ciphertexts Ek(a) and Ek(b) without ...
Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
ICML
2003
IEEE
14 years 8 months ago
Relativized Options: Choosing the Right Transformation
Relativized options combine model minimization methods and a hierarchical reinforcement learning framework to derive compact reduced representations of a related family of tasks. ...
Balaraman Ravindran, Andrew G. Barto
ACSAC
1999
IEEE
13 years 12 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
DSN
2006
IEEE
14 years 1 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh