Sciweavers

626 search results - page 19 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
JUCS
2010
159views more  JUCS 2010»
13 years 5 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 5 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
BIBE
2001
IEEE
193views Bioinformatics» more  BIBE 2001»
14 years 1 months ago
GIMS - A Data Warehouse for Storage and Analysis of Genome Sequence and Functional Data
Effective analysis of genome sequences and associated functional data requires access to many different kinds of biological information. For example, when analysing gene expressio...
Mike Cornell, Norman W. Paton, Shengli Wu, Carole ...
PET
2009
Springer
14 years 4 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
CSFW
2004
IEEE
14 years 2 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk