Sciweavers

341 search results - page 50 / 69
» Maturity-independent risk measures
Sort
View
CHI
2003
ACM
14 years 9 months ago
Shiny happy people building trust?: photos on e-commerce websites and consumer trust
Designing for trust in technology-mediated interaction is an increasing concern in CHI. In advertising, images of people have long been used to create positive attitudes to produc...
Jens Riegelsberger, Martina Angela Sasse, John D. ...
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 9 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
ACSAC
2009
IEEE
14 years 3 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
FOSSACS
2009
Springer
14 years 3 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
NDSS
2009
IEEE
14 years 3 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...