Sciweavers

831 search results - page 29 / 167
» A Security Concept for OLAP
Sort
View
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
14 years 3 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...
IEEEIAS
2007
IEEE
14 years 3 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi
WOA
2001
13 years 10 months ago
Multi-User and Security Support for Multi-Agent Systems
This paper discusses the requirements an agent system needs to be secure. In particular, the paper introduces a classification of modern distributed systems, and examines the dele...
Agostino Poggi, Giovanni Rimassa, Michele Tomaiuol...
PST
2004
13 years 10 months ago
A Diagrammatical Framework for Information Systems Attacks
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...
Terry Roebuck
SP
2002
IEEE
121views Security Privacy» more  SP 2002»
13 years 8 months ago
Intrusion-Tolerant Enclaves
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be ab...
Bruno Dutertre, Valentin Crettaz, Victoria Stavrid...