Sciweavers

471 search results - page 28 / 95
» Social applications: exploring a more secure framework
Sort
View
WISE
2009
Springer
14 years 5 months ago
Clustering of Social Tagging System Users: A Topic and Time Based Approach
Abstract. Under Social Tagging Systems, a typical Web 2.0 application, users label digital data sources by using freely chosen textual descriptions (tags). Mining tag information r...
Vassiliki A. Koutsonikola, Athena Vakali, Eirini G...
CODES
2006
IEEE
14 years 1 months ago
Design space exploration of real-time multi-media MPSoCs with heterogeneous scheduling policies
Real-time multi-media applications are increasingly being mapped onto MPSoC (multi-processor system-on-chip) platforms containing hardware-software IPs (intellectual property) alo...
Minyoung Kim, Sudarshan Banerjee, Nikil Dutt, Nali...
SOCIALCOM
2010
13 years 5 months ago
OSNAC: An Ontology-based Access Control Model for Social Networking Systems
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
Amirreza Masoumzadeh, James B. D. Joshi
ACSAC
2008
IEEE
14 years 2 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
CCS
2008
ACM
13 years 9 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...