Sciweavers

162 search results - page 16 / 33
» Securing Email Archives through User Modeling
Sort
View
IWSEC
2009
Springer
14 years 2 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
CSFW
2009
IEEE
14 years 2 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
SAINT
2003
IEEE
14 years 22 days ago
Virtual Collaboration Spaces: The EVE Community
An Educational Virtual Environment (EVE) is an instance of a Collaborative Virtual Environment (CVE), which focalises in providing collaborative, as well as educational, functiona...
Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiats...
ICWS
2009
IEEE
14 years 4 months ago
Wrap Scientific Applications as WSRF Grid Services Using gRAVI
— Web service models are increasingly being used in the Grid community as way to create distributed applications exposing data and/or applications through self describing interfa...
Kyle Chard, Wei Tan, Joshua Boverhof, Ravi K. Madd...
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 7 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke