Sciweavers

575 search results - page 84 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
ICPPW
2002
IEEE
14 years 19 days ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
AVI
2006
13 years 9 months ago
An integrated task-based framework for the design and evaluation of visualizations to support preferential choice
In previous work, we proposed ValueCharts, a set of visualizations and interactive techniques to support the inspection of linear models of preferences. We now identify the need t...
Jeanette Bautista, Giuseppe Carenini
ISCAPDCS
2004
13 years 9 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
ACSAC
2002
IEEE
14 years 20 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ICIP
2005
IEEE
14 years 9 months ago
Automatic classification of breast density
A recent trend in digital mammography are Computer-Aided Diagnosis systems, which are computerised tools designed to assist radiologists. Most of these systems are used for the au...
Arnau Oliver, Jordi Freixenet, Reyer Zwiggelaar