Sciweavers

3193 search results - page 99 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
ACTA
2002
86views more  ACTA 2002»
13 years 7 months ago
Deriving and paraphrasing information grammars using object-oriented analysis models
Abstract. In this paper the focus is on object-oriented analysis of information systems. We assume that the communication within an application domain can be described by a logbook...
Paul J. M. Frederiks, Theo P. van der Weide
CIVR
2006
Springer
201views Image Analysis» more  CIVR 2006»
13 years 11 months ago
Efficient Margin-Based Rank Learning Algorithms for Information Retrieval
Learning a good ranking function plays a key role for many applications including the task of (multimedia) information retrieval. While there are a few rank learning methods availa...
Rong Yan, Alexander G. Hauptmann
ACSAC
2000
IEEE
14 years 8 days ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
CASES
2003
ACM
14 years 1 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...