Poster: using quantified risk and benefit to strengthen the security of information sharing
Abstract
References
Index Terms
- Poster: using quantified risk and benefit to strengthen the security of information sharing
Recommendations
Dynamic combination of authentication factors based on quantified risk and benefit
By combining multiple factors during authentication, a service can provide better assurance of security. However, the users are likely to feel inconvenient, or even discard the service. This paper, therefore, addresses this issue and introduces a novel ...
Group-centric models for secure and agile information sharing
MMM-ACNS'10: Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network securityTo share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns of sharing are well defined and slow to change it is reasonable to apply the ...
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications securityThe central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthorized disclosure (in contrast to protecting the content to avoid loss of revenue as in retail ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Yan Chen,
- Program Chairs:
- George Danezis,
- Vitaly Shmatikov
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 227Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in