Sciweavers

956 search results - page 141 / 192
» A security framework for agent-based systems
Sort
View
OOPSLA
2000
Springer
14 years 9 days ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
IQIS
2005
ACM
14 years 2 months ago
Blocking-aware private record linkage
In this paper, the problem of quickly matching records (i.e., record linkage problem) from two autonomous sources without revealing privacy to the other parties is considered. In ...
Ali Al-Lawati, Dongwon Lee, Patrick McDaniel
CSI
2007
91views more  CSI 2007»
13 years 8 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 3 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ARESEC
2011
110views more  ARESEC 2011»
12 years 8 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng