Sciweavers

364 search results - page 38 / 73
» Privacy Requirements Implemented with a JavaCard
Sort
View
149
Voted
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 8 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
169
Voted
SACMAT
2011
ACM
14 years 5 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
ESORICS
2009
Springer
16 years 3 months ago
Isolating JavaScript with Filters, Rewriting, and Wrappers
Abstract. We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implemented properly, filters can prevent dangerous code from loading into t...
Sergio Maffeis, John C. Mitchell, Ankur Taly
ESORICS
2009
Springer
16 years 3 months ago
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...
CCS
2009
ACM
16 years 3 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...