Sciweavers

1795 search results - page 89 / 359
» Security Models and Information Flow
Sort
View
133
Voted
SIGIR
2008
ACM
15 years 3 months ago
Separate and inequal: preserving heterogeneity in topical authority flows
Web pages, like people, are often known by others in a variety of contexts. When those contexts are sufficiently distinct, a page's importance may be better represented by mu...
Lan Nie, Brian D. Davison
156
Voted
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 10 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
PET
2004
Springer
15 years 9 months ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...
133
Voted
CCS
2008
ACM
15 years 5 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
149
Voted
ESORICS
2008
Springer
15 years 5 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...