• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 798
Next 10 →

Attribute-based encryption for fine-grained access control of encrypted data

by Vipul Goyal, Amit Sahai, Omkant Pandey, Brent Waters - In Proc. of ACMCCS’06 , 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract - Cited by 522 (23 self) - Add to MetaCart
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We

Improving Cross-Site . . .

by Justin Clayton Samuel , 2009
"... It is common for websites to instruct browsers to make requests to third-party sites for content, advertisements, as well as for purely usertracking purposes. Additionally, malicious or compromised websites can perform attacks on users and websites by leveraging their ability to initiate cross-site ..."
Abstract - Add to MetaCart
It is common for websites to instruct browsers to make requests to third-party sites for content, advertisements, as well as for purely usertracking purposes. Additionally, malicious or compromised websites can perform attacks on users and websites by leveraging their ability to initiate cross-site

Maintainability Implemented by Third-Party Contractor for Public Owner

by Blia Moua Her, Jeffrey S. Russell, M. Asce
"... Abstract: This case study presents an overview of a well-defined corporate maintainability program that is implemented by a third-party contractor for facilities at a National Aeronautics and Space Administration �NASA � site. The third-party contractor is a full-service organization providing desig ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract: This case study presents an overview of a well-defined corporate maintainability program that is implemented by a third-party contractor for facilities at a National Aeronautics and Space Administration �NASA � site. The third-party contractor is a full-service organization providing

Interventions for Optimizing Therapy in Patients with Diabetes Mellitus: A Literature Review Supporting Informed Decisions

by St. Joseph’s Healthcare, Dr. Mike Evans Vice-chair , 2008
"... À l’appui des décisions éclairéesThis report is prepared by the Canadian Optimal Medication Prescribing and Utilization Service (COMPUS), a service of the Canadian Agency for Drugs and Technologies in Health (CADTH). It is a review of the existing public literature and information which was availabl ..."
Abstract - Add to MetaCart
available on the websites of third parties on the Internet. CADTH does not have control over the content of such sites. Use of third-party sites is governed by the terms and conditions set out for such websites. CADTH does not make any representations or give any warranties with respect to any information

Priv3: A Third Party Cookie Policy

by Mohan Dhawan, Christian Kreibich, Nicholas Weaver
"... In today’s World Wide Web, there exists significant economic pressure to track user activity, a development users may find objectionable. Safari’s third-party cookie policy works well to block tracking from advertisers and other pure third-party content, but is insufficient to block the multi-functi ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
-function tracking present in Third-party widgets such as “Like ” buttons and other “social plugins ” offered by the likes of Facebook, Google, and Twitter. These elements provide desired user functionality, but also expose the user to the possibility of cookie/referrer-based tracking by those third-party sites

Characterizing Privacy in Online Social Networks

by Balachander Krishnamurthy, Craig E. Wills
"... Online social networks (OSNs) with half a billion users have dramatically raised concerns on privacy leakage. Users, often willingly, share personal identifying information about themselves, but do not have a clear idea of who accesses their private information or what portion of it really needs to ..."
Abstract - Cited by 94 (8 self) - Add to MetaCart
to be accessed. In this study we examine popular OSNs from a viewpoint of characterizing potential privacy leakage. Our study identifies what bits of information are currently being shared, how widely, and what users can do to prevent such sharing. We also examine the role of third-party sites that track OSN

Designing of An Application on Health Development Based on Android Platform

by Pallavi Gaur, Gopal Krishan Prajapat
"... Android involves many developers writing applications that helps in extended the functionality of the devices. There are currently over 1, 50,000 applications available for Android. Android Market is the online application store run by Google, though applications can also be downloaded from third-pa ..."
Abstract - Add to MetaCart
Android involves many developers writing applications that helps in extended the functionality of the devices. There are currently over 1, 50,000 applications available for Android. Android Market is the online application store run by Google, though applications can also be downloaded from third-party

TABLE OF CONTENTS

by Creek Mi, Douglas W. Young
"... B. PURPOSE. Supersedes reference A1. This instruction contains internal procedures for Defense Reutilization and Marketing Service (DRMS) employees involved in response actions at hazardous waste sites located off military installations. C. APPLICABILITY AND SCOPE. This instruction applies to the De ..."
Abstract - Add to MetaCart
sites are outlined in Chapters I thru IV. F. RESPONSIBILITIES. The Environmental Protection Division (DRMS-SH), shall be responsible for exercising primary staff responsibility for managing and administering the DRMS Third Party Site Program by performing the mission and functions assigned in reference

A Study of Third-Party Tracking by Mobile Apps in the Wild

by Seungyeop Han, Jaeyeon Jung, David Wetherall
"... We report the first field study of real-world tracking via mobile apps in which we measured how 20 participants were tracked over three weeks as they exercised their Android smartphone apps. We instrumented the phones with dynamic taint tracking to record communications that exposed identifying info ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
participant in our study. Most of these sites are heavy trackers: 25 % of their tracking is done with persistent identifiers and geo-location is gathered by half of the top 10 advertisers. To one participant’s surprise, over 600 geocoordinates were exposed to a third-party advertising site during the study

Brahmastra: Driving apps to test the security of third-party components.

by Ravi Bhoraskar , Seungyeop Han , Jinseong Jeon , Tanzirul Azim , Shuo Chen , Jaeyeon Jung , Suman Nath , Rui Wang , David Wetherall - In USENIX Security, , 2014
"... Abstract We present an app automation tool called Brahmastra for helping app stores and security researchers to test thirdparty components in mobile apps at runtime. The main challenge is that call sites that invoke third-party code may be deeply embedded in the app, beyond the reach of traditional ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract We present an app automation tool called Brahmastra for helping app stores and security researchers to test thirdparty components in mobile apps at runtime. The main challenge is that call sites that invoke third-party code may be deeply embedded in the app, beyond the reach
Next 10 →
Results 1 - 10 of 798
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University