Sciweavers

90 search results - page 7 / 18
» A Decision Theoretic Approach to Data Leakage Prevention
Sort
View
ACSC
2007
IEEE
13 years 11 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
SEMWEB
2009
Springer
14 years 2 months ago
Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil
To cope with society’s demand for transparency and corruption prevention, the Brazilian Office of the Comptroller General (CGU) has carried out a number of actions, including: aw...
Rommel N. Carvalho, Kathryn B. Laskey, Paulo Cesar...
AAAI
2004
13 years 8 months ago
Using Performance Profile Trees to Improve Deliberation Control
Performance profile trees have recently been proposed as a theoretical basis for fully normative deliberation control. In this paper we conduct the first experimental study of the...
Kate Larson, Tuomas Sandholm
GI
2007
Springer
14 years 1 months ago
Fuzzy Operators for Confidence Modelling in Automotive Safety Applications
: The fusion of data from different sensorial sources is the most promising method to increase robustness and reliability of environmental perception today. The paper presents an a...
Ulrich Scheunert, Philipp Lindner, Eric Richter, G...
TES
2001
Springer
13 years 12 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...