Sciweavers

206 search results - page 30 / 42
» Inferring privacy policies for social networking services
Sort
View
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 8 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
PDP
2010
IEEE
14 years 2 months ago
Trusted Interaction Patterns in Large-scale Enterprise Service Networks
Abstract—The evolution towards cross-organizational collaboration and interaction patterns has led to the emergence of scalable, Web services-based composition infrastructures. T...
Florian Skopik, Daniel Schall, Schahram Dustdar
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
14 years 2 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...