Sciweavers

806 search results - page 24 / 162
» Privacy Policy Referencing
Sort
View
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
14 years 2 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens
TRUSTBUS
2010
Springer
13 years 7 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
GI
2009
Springer
13 years 7 months ago
Putting Privacy Pictograms into Practice - a European Perspective
: Recent proposals for privacy pictograms show a growing interest of simplifying privacy-related statements. Such pictograms can be useful to enhance the users' understanding ...
Marit Hansen
SOUPS
2009
ACM
14 years 4 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 3 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell