Sciweavers

364 search results - page 9 / 73
» E-Voting System Security Optimization
Sort
View
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
14 years 3 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
CCS
2006
ACM
14 years 4 days ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
ICSE
2007
IEEE-ACM
14 years 8 months ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price
IFIP
2007
Springer
14 years 2 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 2 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...