Results 1 - 10
of
798
Attribute-based encryption for fine-grained access control of encrypted data
- In Proc. of ACMCCS’06
, 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract
-
Cited by 522 (23 self)
- Add to MetaCart
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We
Improving Cross-Site . . .
, 2009
"... It is common for websites to instruct browsers to make requests to third-party sites for content, advertisements, as well as for purely usertracking purposes. Additionally, malicious or compromised websites can perform attacks on users and websites by leveraging their ability to initiate cross-site ..."
Abstract
- Add to MetaCart
It is common for websites to instruct browsers to make requests to third-party sites for content, advertisements, as well as for purely usertracking purposes. Additionally, malicious or compromised websites can perform attacks on users and websites by leveraging their ability to initiate cross-site
Maintainability Implemented by Third-Party Contractor for Public Owner
"... Abstract: This case study presents an overview of a well-defined corporate maintainability program that is implemented by a third-party contractor for facilities at a National Aeronautics and Space Administration �NASA � site. The third-party contractor is a full-service organization providing desig ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract: This case study presents an overview of a well-defined corporate maintainability program that is implemented by a third-party contractor for facilities at a National Aeronautics and Space Administration �NASA � site. The third-party contractor is a full-service organization providing
Interventions for Optimizing Therapy in Patients with Diabetes Mellitus: A Literature Review Supporting Informed Decisions
, 2008
"... À l’appui des décisions éclairéesThis report is prepared by the Canadian Optimal Medication Prescribing and Utilization Service (COMPUS), a service of the Canadian Agency for Drugs and Technologies in Health (CADTH). It is a review of the existing public literature and information which was availabl ..."
Abstract
- Add to MetaCart
available on the websites of third parties on the Internet. CADTH does not have control over the content of such sites. Use of third-party sites is governed by the terms and conditions set out for such websites. CADTH does not make any representations or give any warranties with respect to any information
Priv3: A Third Party Cookie Policy
"... In today’s World Wide Web, there exists significant economic pressure to track user activity, a development users may find objectionable. Safari’s third-party cookie policy works well to block tracking from advertisers and other pure third-party content, but is insufficient to block the multi-functi ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
-function tracking present in Third-party widgets such as “Like ” buttons and other “social plugins ” offered by the likes of Facebook, Google, and Twitter. These elements provide desired user functionality, but also expose the user to the possibility of cookie/referrer-based tracking by those third-party sites
Characterizing Privacy in Online Social Networks
"... Online social networks (OSNs) with half a billion users have dramatically raised concerns on privacy leakage. Users, often willingly, share personal identifying information about themselves, but do not have a clear idea of who accesses their private information or what portion of it really needs to ..."
Abstract
-
Cited by 94 (8 self)
- Add to MetaCart
to be accessed. In this study we examine popular OSNs from a viewpoint of characterizing potential privacy leakage. Our study identifies what bits of information are currently being shared, how widely, and what users can do to prevent such sharing. We also examine the role of third-party sites that track OSN
Designing of An Application on Health Development Based on Android Platform
"... Android involves many developers writing applications that helps in extended the functionality of the devices. There are currently over 1, 50,000 applications available for Android. Android Market is the online application store run by Google, though applications can also be downloaded from third-pa ..."
Abstract
- Add to MetaCart
Android involves many developers writing applications that helps in extended the functionality of the devices. There are currently over 1, 50,000 applications available for Android. Android Market is the online application store run by Google, though applications can also be downloaded from third-party
TABLE OF CONTENTS
"... B. PURPOSE. Supersedes reference A1. This instruction contains internal procedures for Defense Reutilization and Marketing Service (DRMS) employees involved in response actions at hazardous waste sites located off military installations. C. APPLICABILITY AND SCOPE. This instruction applies to the De ..."
Abstract
- Add to MetaCart
sites are outlined in Chapters I thru IV. F. RESPONSIBILITIES. The Environmental Protection Division (DRMS-SH), shall be responsible for exercising primary staff responsibility for managing and administering the DRMS Third Party Site Program by performing the mission and functions assigned in reference
A Study of Third-Party Tracking by Mobile Apps in the Wild
"... We report the first field study of real-world tracking via mobile apps in which we measured how 20 participants were tracked over three weeks as they exercised their Android smartphone apps. We instrumented the phones with dynamic taint tracking to record communications that exposed identifying info ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
participant in our study. Most of these sites are heavy trackers: 25 % of their tracking is done with persistent identifiers and geo-location is gathered by half of the top 10 advertisers. To one participant’s surprise, over 600 geocoordinates were exposed to a third-party advertising site during the study
Brahmastra: Driving apps to test the security of third-party components.
- In USENIX Security,
, 2014
"... Abstract We present an app automation tool called Brahmastra for helping app stores and security researchers to test thirdparty components in mobile apps at runtime. The main challenge is that call sites that invoke third-party code may be deeply embedded in the app, beyond the reach of traditional ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract We present an app automation tool called Brahmastra for helping app stores and security researchers to test thirdparty components in mobile apps at runtime. The main challenge is that call sites that invoke third-party code may be deeply embedded in the app, beyond the reach
Results 1 - 10
of
798