Encephalitis 发表于 2025-3-23 13:38:07
SUDUTA: Script UAF Detection Using Taint Analysison-line, enabling instrumentation code to gain access to the program state of the application. Lastly, it handles the presence of custom memory allocators that are typically utilised in script-hosting applications. Results obtained using a benchmark dataset and vulnerable applications validate these three improvements.forager 发表于 2025-3-23 13:58:33
Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Businessr presents an economic model of the privacy problem in data-centric business, in that drawing from contract theory. Building upon a critical analysis of the model, this paper analyzes how regulatory and technological instruments could balance efficiency of markets for personal data and data-subjects’ right to informational self-determination.Clinch 发表于 2025-3-23 21:21:48
Two-Factor Authentication for the Bitcoin Protocolor authentication and verification over a separate channel. Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking authentication methods.终端 发表于 2025-3-23 22:33:43
Conference proceedings 2015refully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability..预兆好 发表于 2025-3-24 04:12:16
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaignsine frauds. This paper presents a self-learning framework to automatically divide and classify large amounts of spam emails in correlated labeled groups. Building on large datasets daily collected through honeypots, the emails are firstly divided into homogeneous groups of similar messages (campaign虚构的东西 发表于 2025-3-24 06:40:02
Integrating Privacy and Safety Criteria into Planning Tasks safety criteria into planning tasks. We apply the approach to the journey planning using two criteria: (i) a willingness-to-share-data (WSD) metric to control data disclosure, and (ii) the number of unsatisfied safety preferences (USP) metric to mitigate risky journeys.PHON 发表于 2025-3-24 14:41:44
Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environmentsing data from the operational system to express the current state against these models. Many factors impact the confidence we can have in these metrics and their reported status. One major factor is the trust we can put in the provided measurement data. This paper describes the properties of a trustOCTO 发表于 2025-3-24 15:31:24
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policiesspecification and enforcement of purpose-aware policies are unsatisfactory for their ambiguous semantics of purposes and/or lack of support to the run-time enforcement of policies..In this paper, we propose a declarative framework based on a first-order temporal logic that allows us to give a precisdefeatist 发表于 2025-3-24 19:44:46
http://reply.papertrans.cn/87/8636/863548/863548_19.pngInertia 发表于 2025-3-24 23:26:36
Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Businesscy. Based upon a commodity-centric notion of privacy, this paper takes a principal-agent perspective on data-centric business. Specifically, this paper presents an economic model of the privacy problem in data-centric business, in that drawing from contract theory. Building upon a critical analysis