-
A Trusted Information Sharing Project From
Syracuse University, Electrical Engineering &
Computer Science
-
Using Subject- and Object-specific Attributes for
Access Control in Web-based Knowledge Management
Systems From Vienna University of Economics and
BA
-
Auditable Security Controls Of Best In Class
Security and IT Operations Organizations By Gene
Kim, CTO, Tripwire, Inc.
-
A Queuing Formulation of Intrusion Detection with
Active and Passive Responses From Department of
Information Systems and Operations Management,
School of Management, The University of Texas at
Dallas
-
Ferret By T.J.
Smith, Research Triangle Park, NC
-
Detecting the Misappropriation of Sensitive
Information through Bottleneck Monitoring By T.J
Goan, Stottler Henke Associates Inc.
-
Network Log Anonymization: Application of Crypto-PAn
to Cisco Netflows From National Center for
Supercomputing Applications (NCSA), University of
Illinois at Urbana-Champaign
-
A Control Flow Integrity Based Trust Model, By
Ge Zhu, Akhilesh Tyagi, Iowa State University.
-
Trust Management and Theory Revision By Ji Ma,
School of Computer and Information Science,
University of South Australia.
-
Using Entropy to Trade Privacy for Trust From
Department of Computer Sciences, Purdue University.
-
Statistical Privacy For Privacy Preserving
Information Sharing, Johannes Gehrke, Cornell
University
-
On Privacy and Anonymity in Knowledge
Externalization From The Chinese University of
Hong Kong
-
Trust-based Privacy Preservation for Peer-to-peer
Data Sharing From Department of Computer
Sciences, Purdue University
-
Securing Information through Trust Management in
Wireless Networks From Computer Science and
Engineering, The State University of New York at
Buffalo
-
PBKM: A Secure Knowledge Management Framework
From Dept. Computer Science, UT @ San Antonio