Sciweavers

1779 search results - page 105 / 356
» A Formal Model of Data Privacy
Sort
View
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 4 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
BIOSURVEILLANCE
2008
Springer
15 years 6 months ago
Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities
Salmonella is among the most common food borne illnesses which may result from consumption of contaminated products. In this paper we model the co-occurrence data between USDA-cont...
Purnamrita Sarkar, Lujie Chen, Artur Dubrawski
IWSEC
2010
Springer
15 years 2 months ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
ESORICS
2005
Springer
15 years 9 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
BIOSURVEILLANCE
2007
Springer
15 years 10 months ago
A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases
Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
Yanna Shen, Gregory F. Cooper