Sciweavers

831 search results - page 46 / 167
» A Security Concept for OLAP
Sort
View
WSS
2001
110views Control Systems» more  WSS 2001»
13 years 11 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 11 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
JNW
2006
55views more  JNW 2006»
13 years 10 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
POLICY
2009
Springer
14 years 4 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
HICSS
2008
IEEE
138views Biometrics» more  HICSS 2008»
14 years 4 months ago
Cyber Security and Government Fusion Centers
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed ...
Natalie Granado, Gregory White