Suchergebnisse - "Security and privacy Systems security Operating systems security"

  • Treffer 1 - 6 von 6
Treffer weiter einschränken
  1. 1

    Accounting for Missing Events in Statistical Information Leakage Analysis von Lee, Seongmin, Minocha, Shreyas, Bohme, Marcel

    ISSN: 1558-1225
    Veröffentlicht: IEEE 26.04.2025
    “… The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less …”
    Volltext
    Tagungsbericht
  2. 2

    A Unified Browser-Based Consent Management Framework von Kancherla, Gayatri Priyadarsini, Bichhawat, Abhishek

    ISSN: 2832-7632
    Veröffentlicht: IEEE 27.04.2025
    “… Today's users are concerned about the privacy of their personal or sensitive information on the Web because of the different techniques employed to track their …”
    Volltext
    Tagungsbericht
  3. 3

    Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers von Parno, Bryan Jeffery

    ISBN: 1627054774, 9781627054775
    ISSN: 2374-6777
    Veröffentlicht: New York, NY, USA Association for Computing Machinery and Morgan & Claypool 05.06.2014
    “… From the Preface As society rushes to digitize sensitive information and services, it is imperative that we adopt adequate security protections. However, such …”
    Volltext
    E-Book
  4. 4

    Usable Object Management approaches for online social networks von Cheek, Gorrell P., Shehab, Mohamed

    Veröffentlicht: ACM and IEEE 01.08.2013
    “… and managing the large numbers of subjects or friends within these online social networks. Usable approaches for managing large amounts of objects, in the form of privacy information and content, have lagged …”
    Volltext
    Tagungsbericht
  5. 5

    Access Control with Uncertain Surveillance von Balbiani, Philippe

    ISBN: 076952415X, 9780769524153
    Veröffentlicht: Washington, DC, USA IEEE Computer Society 19.09.2005
    “… We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood …”
    Volltext
    Tagungsbericht
  6. 6

    A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification von Foley, Simon, Gong, Li, Qian, Xiaolei

    ISBN: 0818674172, 9780818674174
    Veröffentlicht: Washington, DC, USA IEEE Computer Society 06.05.1996
    “… In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of …”
    Volltext
    Tagungsbericht