Sciweavers

739 search results - page 101 / 148
» Information Flow in Credential Systems
Sort
View
SRDS
2000
IEEE
14 years 2 days ago
Performance of Mobile, Single-Object, Replication Protocols
This paper discusses the implementation and performance of bounded voting: a new object replication protocol designed for use in mobile and weakly-connected environments. We show ...
Ugur Çetintemel, Peter J. Keleher
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
POPL
2005
ACM
14 years 8 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
24
Voted
CHI
2004
ACM
14 years 8 months ago
A grounded investigation of game immersion
The term immersion is widely used to describe games but it is not clear what immersion is or indeed if people are using the same word consistently. This paper describes work done ...
Emily Brown, Paul A. Cairns
CIKM
2001
Springer
14 years 6 days ago
Automatic Recognition of Distinguishing Negative Indirect History Language in Judicial Opinions
We describe a model-based filtering application that generates candidate case-to-case distinguishing citations. We developed the system to aid editors in identifying indirect rela...
Jack G. Conrad, Daniel P. Dabney