Sciweavers

1779 search results - page 100 / 356
» A Formal Model of Data Privacy
Sort
View
CRITIS
2007
15 years 5 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
AGENTS
1999
Springer
15 years 8 months ago
Learning to Remove Internet Advertisements
This paper discusses improving the methodology introduced in Kushmerick’s paper about learning to remove internet advertisements. The aim is to reduce the model build time as we...
Nicholas Kushmerick
ACSAC
2009
IEEE
15 years 11 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
ICEGOV
2007
ACM
15 years 8 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
ASM
1998
ASM
15 years 8 months ago
Modeling Cache Coherence Protocol - A Case Study with FLASH
This paper is devoted to the speci cation of the Stanford FLASHcache coherence protocol within the ASM formalism. Correctness proofs related to data consistency are presented. Corn...
Arnaud Durand