Výsledky vyhledávání - "Social and professional topics Computing technology policy Computer crime"

  • Zobrazuji výsledky 1 - 8 z 8
Upřesnit hledání
  1. 1

    Accounting for Missing Events in Statistical Information Leakage Analysis Autor Lee, Seongmin, Minocha, Shreyas, Bohme, Marcel

    ISSN: 1558-1225
    Vydáno: IEEE 26.04.2025
    “…The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less…”
    Získat plný text
    Konferenční příspěvek
  2. 2

    A Unified Browser-Based Consent Management Framework Autor Kancherla, Gayatri Priyadarsini, Bichhawat, Abhishek

    ISSN: 2832-7632
    Vydáno: IEEE 27.04.2025
    “…Today's users are concerned about the privacy of their personal or sensitive information on the Web because of the different techniques employed to track their…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Autor Parno, Bryan Jeffery

    ISBN: 1627054774, 9781627054775
    ISSN: 2374-6777
    Vydáno: New York, NY, USA Association for Computing Machinery and Morgan & Claypool 05.06.2014
    “…From the Preface As society rushes to digitize sensitive information and services, it is imperative that we adopt adequate security protections. However, such…”
    Získat plný text
    E-kniha
  4. 4

    Usable Object Management approaches for online social networks Autor Cheek, Gorrell P., Shehab, Mohamed

    Vydáno: ACM and IEEE 01.08.2013
    “… and managing the large numbers of subjects or friends within these online social networks. Usable approaches for managing large amounts of objects, in the form of privacy information and content, have lagged…”
    Získat plný text
    Konferenční příspěvek
  5. 5

    A Trustworthiness Fusion Model for Service Cloud Platform Based on D-S Evidence Theory Autor Rong Hu, Jianxun Liu, Liu, X. F.

    ISBN: 1457701294, 9781457701290
    Vydáno: IEEE 01.05.2011
    “…Trustworthiness plays an important role in service selection and usage. However, it is not easy to define and compute the service trustworthiness because of its subject meaning and also the different views…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration Autor Jean, Evens, Jiao, Yu, Hurson, Ali R., Potok, Thomas E.

    ISBN: 0769530281, 9780769530284
    Vydáno: Washington, DC, USA IEEE Computer Society 02.11.2007
    “…The use of mobile agents to support the development of practical applications is limited primarily by the risks to which hosts in the system are subject…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Access Control with Uncertain Surveillance Autor Balbiani, Philippe

    ISBN: 076952415X, 9780769524153
    Vydáno: Washington, DC, USA IEEE Computer Society 19.09.2005
    “…We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification Autor Foley, Simon, Gong, Li, Qian, Xiaolei

    ISBN: 0818674172, 9780818674174
    Vydáno: Washington, DC, USA IEEE Computer Society 06.05.1996
    “…In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of…”
    Získat plný text
    Konferenční příspěvek