Full disclosure (computer security)

Known as: Full disclosure, Full disclosure movement 
In the field of computer security, independent researchers often discover flaws in software that can be abused to cause unintended behaviour, these… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1991-2017
051019912017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Disseminating medical data beyond the protected cloud of institutions poses severe risks to patients’ privacy, as breaches push… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2016
2016
Amazon EC2 and Google Compute Engine (GCE) have recently introduced a new class of virtual machines called “burstable” instances… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2012
2012
This article asks when communication with certifiable information leads to complete information sharing. We consider Bayesian… (More)
  • figure 1
Is this relevant?
2012
2012
  • Moein Zareian
  • 2012
One of the accounting information goals is helping users in predicting investment return on investment. Some variables affecting… (More)
  • table 1
Is this relevant?
2010
2010
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
During the last years, researchers have focused on designing secure and efficient RFID authentication protocols. The vast… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Focusing on signaling games, I illustrate the relevance of the rationalizability approach for the analysis multistage games with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2002
2002
Digital rights management (DRM) is an attempt to provide " remote control " over digital content. The required level of… (More)
Is this relevant?
1999
1999
An important requirement of any information management system is to protect information against improper disclosure or modi… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1995
Highly Cited
1995
This report discusses the design of computational experiments to test heuristic methods and provides reporting guidelines for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?