Sciweavers

274 search results - page 16 / 55
» Security user studies: methodologies and best practices
Sort
View
PET
2004
Springer
14 years 4 months ago
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
Abstract. Although the number of online privacy policies is increasing, it remains difficult for Internet users to understand them, let alone to compare policies across sites or i...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
CHI
2009
ACM
14 years 11 months ago
Designing a privacy label: assisting consumer understanding of online privacy practices
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Patrick Gage Kelley
ICSE
1999
IEEE-ACM
14 years 3 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
CONEXT
2007
ACM
14 years 2 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 6 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...