Sciweavers

739 search results - page 6 / 148
» Information Flow in Credential Systems
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 2 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
WSC
2004
13 years 9 months ago
Design Specifications of a Generic Supply Chain Simulator
This paper describes a design specification for a generic, supply-chain-simulation system. The proposed simulation system is based on schedule-driven and stock-driven control meth...
Shigeki Umeda, Y. Tina Lee
ASPLOS
2009
ACM
14 years 8 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
CCS
2010
ACM
13 years 7 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
DIM
2006
ACM
14 years 1 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...