Sciweavers

382 search results - page 53 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
NORDSEC
2009
Springer
14 years 2 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
CCS
2007
ACM
14 years 1 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
MDM
2007
Springer
279views Communications» more  MDM 2007»
14 years 1 months ago
Anonymity in Location-Based Services: Towards a General Framework
A general consensus is that the proliferation of locationaware devices will result in a diffusion of location-based services. Privacy preservation is a challenging research issue ...
Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wa...
SACMAT
2009
ACM
14 years 2 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...