Sciweavers

2178 search results - page 313 / 436
» Toward Systemically Secure IT Architectures
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
14 years 2 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
IEEESCC
2007
IEEE
14 years 2 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
IADIS
2003
13 years 9 months ago
Moda-Ml, an Interoperability Framework for the Textile-Clothing Sector
The MODA-ML project aims to enhance the interoperability between enterprises in the Textile/Clothing sector defining a common interchange language based on a set of XML business c...
Nicola Gessa, Fabio Vitali, Guido Cucchiara, Piero...
DAC
2002
ACM
14 years 9 months ago
Unlocking the design secrets of a 2.29 Gb/s Rijndael processor
This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of encryption throughput ...
Patrick Schaumont, Henry Kuo, Ingrid Verbauwhede