Sciweavers

451 search results - page 54 / 91
» What Is a Conversation Policy
Sort
View
HASKELL
2008
ACM
13 years 11 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
CSSE
2004
IEEE
13 years 9 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
GIS
2010
ACM
13 years 8 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
CHI
2011
ACM
13 years 1 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
INFOCOM
2012
IEEE
12 years 10 days ago
Sharing the cost of backbone networks: Simplicity vs. precision
—Internet backbone operators face a trade-off in quantifying the costs that their customers inflict on their infrastructure since the precision of these methods depends on the r...
László Gyarmati, Michael Sirivianos,...