Sciweavers

IEEESP
2010
46views more  IEEESP 2010»
13 years 6 months ago
New Security Architectures Based on Emerging Disk Functionality
Kevin R. B. Butler, Stephen E. McLaughlin, Thomas ...
IEEESP
2010
101views more  IEEESP 2010»
13 years 6 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato
IEEESP
2010
68views more  IEEESP 2010»
13 years 6 months ago
How to Do Application Logging Right
Anton Chuvakin, Gunnar Peterson
IEEESP
2010
105views more  IEEESP 2010»
13 years 6 months ago
Data Tagging for New Information Governance Models
Paula J. Bruening, K. Krasnow Waterman
IEEESP
2010
126views more  IEEESP 2010»
13 years 6 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
IEEESP
2010
80views more  IEEESP 2010»
13 years 6 months ago
Drawing the Line
Carl E. Landwehr
IEEESP
2010
77views more  IEEESP 2010»
13 years 6 months ago
Voice-over-IP Security: Research and Practice
Angelos D. Keromytis
IEEESP
2010
52views more  IEEESP 2010»
13 years 6 months ago
10 Quick, Dirty, and Cheap Things to Improve Enterprise Security
James McGovern, Gunnar Peterson