Sciweavers

1235 search results - page 122 / 247
» Formalizing information security knowledge
Sort
View
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 1 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
CCS
2004
ACM
14 years 1 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
11 years 10 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
ICALT
2006
IEEE
14 years 2 months ago
Building Learning Networks for Lifelong Learners: Challenges, Models, Technologies and Standards
In this tutorial five key problems are discussed that occur in the area of lifelong learning. For each problem we will look at the possible technological solutions. The five probl...
Rob Koper
COSIT
2007
Springer
126views GIS» more  COSIT 2007»
13 years 12 months ago
Evaluation of a Semantic Similarity Measure for Natural Language Spatial Relations
Consistent and flawless communication between humans and machines is the precondition for a computer to process instructions correctly. While machines use well-defined languages an...
Angela Schwering