Zobrazeno 1 - 10
of 143
pro vyhledávání: '"Simon N Foley"'
Publikováno v:
Frontiers in Big Data, Vol 3 (2020)
Little attention has been paid to the measurement of risk to privacy in Database Management Systems, despite their prevalence as a modality of data access. This paper proposes PriDe, a quantitative privacy metric that provides a measure (privacy scor
Externí odkaz:
https://doaj.org/article/96ae65dedcbe4cab9ebc4d1516d60425
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030939557
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::11960e6533e4bcffc6d89a4db6b7eeb5
https://doi.org/10.1007/978-3-030-93956-4_11
https://doi.org/10.1007/978-3-030-93956-4_11
Publikováno v:
2021 14th International Conference on Security of Information and Networks (SIN).
Publikováno v:
Procedia Computer Science
FNC/MobiSPC
FNC/MobiSPC
Part of special issue: The 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), The 15th International Conference on Future Networks and Communications (FNC),The 10th International Conference on Sustainable Energy Inform
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71f30374355e2a0af37adefa6aad62f9
https://hdl.handle.net/10468/11103
https://hdl.handle.net/10468/11103
Autor:
Vivien M. Rooney, Simon N. Foley
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
Security Protocols Workshop
This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Vivien’s an applied psychologist. We’re interested in understanding how humans experience working with security protocols. And, when I use the word
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b71b74536076e12cfeb282fe6db47a60
https://doi.org/10.1007/978-3-030-57043-9_8
https://doi.org/10.1007/978-3-030-57043-9_8
Autor:
Simon N. Foley, Vivien M. Rooney
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
Security Protocols Workshop
Understanding the human in computer security through Qualitative Research aims at a conceptual repositioning. The aim is to leverage individual human experience to understand and improve the impact of humans in computer security. Embracing what is pa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf29bb2e8e4776172312650b113285fa
https://doi.org/10.1007/978-3-030-57043-9_7
https://doi.org/10.1007/978-3-030-57043-9_7
Autor:
Vivien M. Rooney, Simon N. Foley
Publikováno v:
Information & Computer Security. 26:454-471
Purpose In this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit their security needs. Design/methodology/approach Recognizing
Autor:
Simon N. Foley, Ultan Neville
Publikováno v:
Journal of Computer Security. 26:207-254
An algebra is proposed for constructing and reasoning about anomaly-free firewall policies. Based on the notion of refinement as safe replacement, the algebra provides operators for sequential composition, union and intersection of policies. The alge
Publikováno v:
NTMS
This paper presents, PriDe, a model to measure the deviation of an analyst's (user) querying behaviour from normal querying behaviour. The deviation is measured in terms of privacy, that is to say, how much of the privacy loss has incurred due to thi
Publikováno v:
Proceedings of the ACM International Workshop on Security and Privacy Analytics.
Comparing SQL queries is an interesting area of research, with applications of query similarity in different domains; for instance, anomaly-based intrusion detection systems. Comparing two SQL queries in terms of privacy - privacy comparison as well