Sciweavers

367 search results - page 40 / 74
» The Return of the Sensitivity Attack
Sort
View
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
NSPW
2003
ACM
14 years 1 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
MICRO
2000
IEEE
96views Hardware» more  MICRO 2000»
14 years 4 days ago
Instruction distribution heuristics for quad-cluster, dynamically-scheduled, superscalar processors
We investigate instruction distribution methods for quadcluster, dynamically-scheduled superscalar processors. We study a variety of methods with different cost, performance and c...
Amirali Baniasadi, Andreas Moshovos
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
14 years 2 days ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
ECIS
2003
13 years 9 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica