Sciweavers

15379 search results - page 39 / 3076
» Protecting users from
Sort
View
ADC
2007
Springer
150views Database» more  ADC 2007»
14 years 1 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
SRDS
1999
IEEE
13 years 12 months ago
Security Mechanisms for using Mobile Agents in Electronic Commerce
In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malici...
Paulo Marques, Luís Moura Silva, Joã...
MDAI
2007
Springer
14 years 1 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
POPL
1999
ACM
13 years 12 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
SECURWARE
2008
IEEE
14 years 2 months ago
Preventing Insider Information Leakage for Enterprises
Abstract— This paper proposes a novel mechanism for protecting sensitive information inside big organisations against unauthorised disclosure by insider or outsider adversaries. ...
Imad M. Abbadi, Muntaha Alawneh