Sciweavers

3420 search results - page 560 / 684
» A Language-Based Approach to Security
Sort
View
DIM
2008
ACM
13 years 12 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
CAINE
2008
13 years 11 months ago
A Graphics-User Interface in Support of a Cognitive Inference Architecture
- The objective of this paper is to present a graphical-user-interface (GUI) in support of a decision support system (KASER) for machine understanding. In order to provide informat...
Isai Michel Lombera, Jayeshkumar Patel, Stuart Har...
CSREASAM
2006
13 years 11 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
CMS
2001
133views Communications» more  CMS 2001»
13 years 11 months ago
Asynchronous Large-Scale Certification Based on Certificate Verification Trees
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for im...
M. Mar Albà, Josep Domingo-Ferrer, Francesc...
ECIS
2003
13 years 11 months ago
Towards definitive benchmarking of algorithm performance
One of the primary methods employed by researchers to judge the merits of new heuristics and algorithms is to run them on accepted benchmark test cases and comparing their perform...
Andrew Lim, Wee-Chong Oon, Wenbin Zhu