Suchergebnisse - "Security and privacy Systems security Operating systems security"
-
1
Accounting for Missing Events in Statistical Information Leakage Analysis
ISSN: 1558-1225Veröffentlicht: IEEE 26.04.2025Veröffentlicht in Proceedings / International Conference on Software Engineering (26.04.2025)“… The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less …”
Volltext
Tagungsbericht -
2
A Unified Browser-Based Consent Management Framework
ISSN: 2832-7632Veröffentlicht: IEEE 27.04.2025Veröffentlicht in IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Technologies Results (Online) (27.04.2025)“… Today's users are concerned about the privacy of their personal or sensitive information on the Web because of the different techniques employed to track their …”
Volltext
Tagungsbericht -
3
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
ISBN: 1627054774, 9781627054775ISSN: 2374-6777Veröffentlicht: New York, NY, USA Association for Computing Machinery and Morgan & Claypool 05.06.2014“… From the Preface As society rushes to digitize sensitive information and services, it is imperative that we adopt adequate security protections. However, such …”
Volltext
E-Book -
4
Usable Object Management approaches for online social networks
Veröffentlicht: ACM and IEEE 01.08.2013Veröffentlicht in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM 2013 : Niagara Falls, Canada, August 25-28, 2013 (01.08.2013)“… and managing the large numbers of subjects or friends within these online social networks. Usable approaches for managing large amounts of objects, in the form of privacy information and content, have lagged …”
Volltext
Tagungsbericht -
5
Access Control with Uncertain Surveillance
ISBN: 076952415X, 9780769524153Veröffentlicht: Washington, DC, USA IEEE Computer Society 19.09.2005Veröffentlicht in IEEE/WIC/ACM International Conference on web intelligence (19.09.2005)“… We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood …”
Volltext
Tagungsbericht -
6
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
ISBN: 0818674172, 9780818674174Veröffentlicht: Washington, DC, USA IEEE Computer Society 06.05.1996Veröffentlicht in Proceedings of the 1996 IEEE Symposium on Security and Privacy (06.05.1996)“… In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of …”
Volltext
Tagungsbericht

