Sciweavers

26 search results - page 5 / 6
» ieeesp 2010
Sort
View
IEEESP
2010
46views more  IEEESP 2010»
13 years 6 months ago
New Security Architectures Based on Emerging Disk Functionality
Kevin R. B. Butler, Stephen E. McLaughlin, Thomas ...
IEEESP
2010
82views more  IEEESP 2010»
13 years 6 months ago
Scenario-Driven Role Engineering
Role engineering for role-based access control (RBAC) is a process to define roles, permissions, constraints, and role hierarchies. The scenario-driven role engineering process pr...
Mark Strembeck
IEEESP
2010
99views more  IEEESP 2010»
13 years 6 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
IEEESP
2010
126views more  IEEESP 2010»
13 years 6 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
IEEESP
2010
115views more  IEEESP 2010»
13 years 6 months ago
How Internet Users' Privacy Concerns Have Evolved since 2002
In 2002, we established a baseline for Internet users’ online privacy values. Through a survey we found that information transfer, notice/awareness, and information storage were...
Annie I. Antón, Julia Brande Earp, Jessica ...