Sciweavers

1795 search results - page 247 / 359
» Security Models and Information Flow
Sort
View
124
Voted
CCS
2007
ACM
15 years 10 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
123
Voted
ISI
2007
Springer
15 years 9 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
121
Voted
AGENTS
2001
Springer
15 years 8 months ago
Trust-based facilitator for e-partnerships
In this paper, we propose a facilitator that finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic co...
Chihiro Ono, Boyd C. Paulson Jr., Dai Kanetomo, Ma...
190
Voted
WSC
2001
15 years 5 months ago
Distributed simulation with incorporated APS procedures for high-fidelity supply chain optimization
Tactical and operational planning for manufacturing enterprises are more important today than ever before as their supply chains span the globe. Two state-of-the-art technologies ...
Peter Lendermann, Boon-Ping Gan, Leon F. McGinnis
129
Voted
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 10 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...