Sciweavers

653 search results - page 61 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
BIRTHDAY
2005
Springer
14 years 2 months ago
Splitting Logics
This paper addresses the question of factoring a logic into families of (generally simpler) components, estimating the top– down perspective, splitting, versus the bottom–up, s...
Walter Alexandre Carnielli, Marcelo E. Coniglio
DEXAW
2003
IEEE
98views Database» more  DEXAW 2003»
14 years 2 months ago
Amending P3P for Clearer Privacy Promises
The Platform for Privacy Preferences (P3P) can be a viable tool for organizations to clarify their privacy promises. In this paper, we summarize our experiences and describe some ...
Günter Karjoth, Matthias Schunter, Els Van He...
GD
2008
Springer
13 years 10 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ESCIENCE
2006
IEEE
14 years 3 months ago
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH
Grid systems have a reputation for being difficult to build and use. We describe how the ease of use of the Styx Grid Services (SGS) software can be combined with the security and...
J. D. Blower, K. Haines
CCS
2008
ACM
13 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...