Sciweavers

8701 search results - page 32 / 1741
» Protecting information on the Web
Sort
View
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 10 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
SACMAT
2003
ACM
14 years 3 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
POPL
1999
ACM
14 years 2 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
ICWS
2009
IEEE
13 years 7 months ago
DIALOG: Distributed Auditing Logs
Service-oriented systems facilitate business workflows to span multiple organizations (e.g. by means of Web services). As a side effect, data may be more easily transferred over o...
Christoph Ringelstein, Steffen Staab
ESORICS
2009
Springer
14 years 10 months ago
Content Delivery Networks: Protection or Threat?
Content Delivery Networks (CDNs) are commonly believed to offer their customers protection against application-level denial of service (DoS) attacks. Indeed, a typical CDN with its...
Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovi...