Sciweavers

834 search results - page 94 / 167
» Quantifying and Measuring Anonymity
Sort
View
CCS
2000
ACM
14 years 2 months ago
Timing attacks on Web privacy
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has ...
Edward W. Felten, Michael A. Schneider
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
14 years 10 hour ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
USENIX
2000
13 years 11 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...
USENIX
1993
13 years 11 months ago
Essence: A Resource Discovery System Based on Semantic File Indexing
Discovering different types of file resources (such as documentation, programs, and images) in the vast amount of data contained within network file systems is useful for both u...
Darren R. Hardy, Michael F. Schwartz
CCS
2004
ACM
14 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...