Výsledky vyhledávání - "Social and professional topics Computing technology policy Computer crime"
-
1
Accounting for Missing Events in Statistical Information Leakage Analysis
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“…The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less…”
Získat plný text
Konferenční příspěvek -
2
A Unified Browser-Based Consent Management Framework
ISSN: 2832-7632Vydáno: IEEE 27.04.2025Vydáno v IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Technologies Results (Online) (27.04.2025)“…Today's users are concerned about the privacy of their personal or sensitive information on the Web because of the different techniques employed to track their…”
Získat plný text
Konferenční příspěvek -
3
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
ISBN: 1627054774, 9781627054775ISSN: 2374-6777Vydáno: New York, NY, USA Association for Computing Machinery and Morgan & Claypool 05.06.2014“…From the Preface As society rushes to digitize sensitive information and services, it is imperative that we adopt adequate security protections. However, such…”
Získat plný text
E-kniha -
4
Usable Object Management approaches for online social networks
Vydáno: ACM and IEEE 01.08.2013Vydáno v Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM 2013 : Niagara Falls, Canada, August 25-28, 2013 (01.08.2013)“… and managing the large numbers of subjects or friends within these online social networks. Usable approaches for managing large amounts of objects, in the form of privacy information and content, have lagged…”
Získat plný text
Konferenční příspěvek -
5
A Trustworthiness Fusion Model for Service Cloud Platform Based on D-S Evidence Theory
ISBN: 1457701294, 9781457701290Vydáno: IEEE 01.05.2011Vydáno v 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (01.05.2011)“…Trustworthiness plays an important role in service selection and usage. However, it is not easy to define and compute the service trustworthiness because of its subject meaning and also the different views…”
Získat plný text
Konferenční příspěvek -
6
Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration
ISBN: 0769530281, 9780769530284Vydáno: Washington, DC, USA IEEE Computer Society 02.11.2007Vydáno v Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops (02.11.2007)“…The use of mobile agents to support the development of practical applications is limited primarily by the risks to which hosts in the system are subject…”
Získat plný text
Konferenční příspěvek -
7
Access Control with Uncertain Surveillance
ISBN: 076952415X, 9780769524153Vydáno: Washington, DC, USA IEEE Computer Society 19.09.2005Vydáno v IEEE/WIC/ACM International Conference on web intelligence (19.09.2005)“…We present a variant of the access control matrix model obtained by incorporating uncertain surveillance saying that "if subject s performs illegally action a on object o then the degree of likelihood…”
Získat plný text
Konferenční příspěvek -
8
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
ISBN: 0818674172, 9780818674174Vydáno: Washington, DC, USA IEEE Computer Society 06.05.1996Vydáno v Proceedings of the 1996 IEEE Symposium on Security and Privacy (06.05.1996)“…In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of…”
Získat plný text
Konferenční příspěvek

