Sciweavers

58933 search results - page 169 / 11787
» Information
Sort
View
SECURWARE
2008
IEEE
15 years 10 months ago
Preventing Insider Information Leakage for Enterprises
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
Imad M. Abbadi, Muntaha Alawneh
SUTC
2008
IEEE
15 years 10 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
CISS
2007
IEEE
15 years 10 months ago
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
— The problem of detecting encrypted information flows using timing information is considered. An information flow consists of both information-carrying packets and irrelevant ...
Ting He, Lang Tong
DEXAW
2007
IEEE
101views Database» more  DEXAW 2007»
15 years 10 months ago
An Index Structure To Retrieve Documents With Geographic Information
Both Geographic Information Systems and Information Retrieval have been very active research fields in the last decades. Lately, a new research field called Geographic Informati...
Miguel Rodríguez Luaces, José R. Par...
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
15 years 10 months ago
False Information in Internet Auction Communities
As one of the most important features, the Internet enables individuals to make their personal thoughts and opinions easily accessible to the global community of Internet users. N...
Oliver Hinz
« Prev « First page 169 / 11787 Last » Next »