Sciweavers

705 search results - page 118 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
CIKM
2009
Springer
14 years 4 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
ESORICS
2005
Springer
14 years 3 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
BMCBI
2007
146views more  BMCBI 2007»
13 years 9 months ago
Towards Semantic e-Science for Traditional Chinese Medicine
Background: Recent advances in Web and information technologies with the increasing decentralization of organizational structures have resulted in massive amounts of information r...
Huajun Chen, Yuxin Mao, Xiaoqing Zheng, Meng Cui, ...
SIGCOMM
2009
ACM
14 years 4 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
AISS
2010
165views more  AISS 2010»
13 years 7 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi