Sciweavers

806 search results - page 14 / 162
» Privacy Policy Referencing
Sort
View
CCS
2005
ACM
14 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
CCS
2008
ACM
13 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
SOUPS
2005
ACM
14 years 3 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
CN
2002
116views more  CN 2002»
13 years 9 months ago
ProWGen: a synthetic workload generation tool for simulation evaluation of web proxy caches
This paper describes the design and use of a synthetic Web proxy workload generator called ProWGen to investigate the sensitivity of Web proxy cache replacement policies to five se...
Mudashiru Busari, Carey L. Williamson