Sciweavers

361 search results - page 56 / 73
» A Vector Model of Trust for Developing Trustworthy Systems
Sort
View
SASN
2003
ACM
14 years 1 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
EUROSYS
2008
ACM
14 years 5 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
SIGSOFT
2008
ACM
14 years 9 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
DEBU
2010
127views more  DEBU 2010»
13 years 6 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
SPEECH
2010
210views more  SPEECH 2010»
13 years 7 months ago
An overview of text-independent speaker recognition: From features to supervectors
This paper gives an overview of automatic speaker recognition technology, with an emphasis on text-independent recognition. Speaker recognition has been studied actively for sever...
Tomi Kinnunen, Haizhou Li