Sciweavers

2272 search results - page 340 / 455
» Provable Data Privacy
Sort
View
CHI
2010
ACM
14 years 2 months ago
Trained to accept?: a field experiment on consent dialogs
A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
Rainer Böhme, Stefan Köpsell
ACSAC
2003
IEEE
14 years 2 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
DEXAW
2003
IEEE
94views Database» more  DEXAW 2003»
14 years 2 months ago
Experiences Running a Web Anonymising Service
The research project “AN.ON – Anonymity online” focuses on developing and providing a web anonymising service. This service provides anonymity and unobservability against ex...
Claudia Golembiewski, Marit Hansen, Sandra Steinbr...
SP
2003
IEEE
14 years 2 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
SP
2003
IEEE
14 years 2 months ago
Hardening Functions for Large Scale Distributed Computations
Many recent large-scale distributed computing applications utilize spare processor cycles of personal computers that are connected to the Internet. The resulting distributed compu...
Doug Szajda, Barry G. Lawson, Jason Owen