Sciweavers

8701 search results - page 39 / 1741
» Protecting information on the Web
Sort
View
DBSEC
2008
129views Database» more  DBSEC 2008»
13 years 11 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
14 years 4 months ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
ISCIS
2003
Springer
14 years 3 months ago
A Cooperative Paradigm for Fighting Information Overload
The Web is mainly processed by humans. The role of the machines is just to transmit and display the contents of the documents, barely being able to do something else. Nowadays ther...
Daniel Gayo-Avello, Darío Álvarez Gu...
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 4 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...