Sciweavers

282 search results - page 34 / 57
» Private Policy Negotiation
Sort
View
CCS
2009
ACM
14 years 3 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
IFIP
2007
Springer
14 years 2 months ago
Cyber Security: Are Economic Incentives Adequate?
Protecting national critical infrastructure assets from cyber incidents is an important challenge. One facet of this challenge is that the vast majority of the owners and operators...
Scott Dynes, Eric Goetz, Michael Freeman
HICSS
2006
IEEE
99views Biometrics» more  HICSS 2006»
14 years 2 months ago
Challenges of Treating Information as a Public Resource: The Case of Parcel Data
Land parcels are the foundation for many aspects of public and community life. This report presents the findings of a study of information about land parcels in New York State. It...
Sharon S. Dawes, Meghan E. Cook, Natalie Helbig
SPW
2005
Springer
14 years 1 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 8 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone