Sciweavers

87 search results - page 17 / 18
» ieeesp 2006
Sort
View
IEEESP
2010
115views more  IEEESP 2010»
13 years 9 months ago
How Internet Users' Privacy Concerns Have Evolved since 2002
In 2002, we established a baseline for Internet users’ online privacy values. Through a survey we found that information transfer, notice/awareness, and information storage were...
Annie I. Antón, Julia Brande Earp, Jessica ...
IEEESP
2010
99views more  IEEESP 2010»
13 years 9 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
IEEESP
2010
126views more  IEEESP 2010»
13 years 9 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
IEEESP
2007
98views more  IEEESP 2007»
13 years 10 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
IEEESP
2010
101views more  IEEESP 2010»
13 years 9 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato