Sciweavers

192 search results - page 20 / 39
» Who gets spammed
Sort
View
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
14 years 1 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
CCS
2007
ACM
14 years 1 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
ICALP
2007
Springer
14 years 1 months ago
A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC)
Abstract. We provide a new characterization of certain zero-knowledge protocols as non-interactive instance-dependent commitment-schemes (NIC). To obtain this result we consider th...
Bruce M. Kapron, Lior Malka, Srinivasan Venkatesh
SEMWEB
2007
Springer
14 years 1 months ago
Potluck: Data Mash-Up Tool for Casual Users
As more and more reusable structured data appears on the Web, casual users will want to take into their own hands the task of mashing up data rather than wait for mash-up sites to ...
David F. Huynh, Robert C. Miller, David R. Karger
CSCW
2006
ACM
14 years 1 months ago
Identification of coordination requirements: implications for the Design of collaboration and awareness tools
Task dependencies drive the need to coordinate work activities. We describe a technique for using automatically generated archival data to compute coordination requirements, i.e.,...
Marcelo Cataldo, Patrick Wagstrom, James D. Herbsl...