Sciweavers

144 search results - page 8 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 7 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
13 years 9 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu
MSV
2004
13 years 9 months ago
Accurate Modeling and Simulation of Heart Tissue with GDEVS/Cell-DEVS
- We present a model describing the electrical behavior of the heart tissue. Previous research in this field have studied this problem using PDEs (Partial Differential Equations) a...
Gabriel A. Wainer, Norbert Giambiasi
SENSYS
2010
ACM
13 years 5 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
FM
2006
Springer
121views Formal Methods» more  FM 2006»
13 years 11 months ago
Properties of Behavioural Model Merging
Constructing comprehensive operational models of intended system behaviour is a complex and costly task. Consequently, practitioners adopt techniques that support partial behaviour...
Greg Brunet, Marsha Chechik, Sebastián Uchi...