Sciweavers

58933 search results - page 187 / 11787
» Information
Sort
View
ATAL
2009
Springer
15 years 10 months ago
Analyzing the performance of randomized information sharing
In large, collaborative, heterogeneous teams, team members often collect information that is useful to other members of the team. Recognizing the utility of such information and d...
Prasanna Velagapudi, Oleg A. Prokopyev, Katia P. S...
IFIP
2009
Springer
15 years 10 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
CISS
2008
IEEE
15 years 10 months ago
A distributed scheme for detection of information flows
—Distributed detection of information flows spanning many nodes in a wireless sensor network is considered. In such a system, eavesdroppers are deployed near several nodes in th...
Ameya Agaskar, Lang Tong, Ting He
COLCOM
2008
IEEE
15 years 10 months ago
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators whi...
Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squiccia...
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
15 years 10 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...
« Prev « First page 187 / 11787 Last » Next »