Sciweavers

522 search results - page 49 / 105
» Answering Aggregation Queries in a Secure System Model
Sort
View
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
14 years 1 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...
MODELS
2007
Springer
14 years 1 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
AGENTS
2001
Springer
14 years 6 days ago
Evaluation of modeling techniques for agent-based systems
To develop agent-based systems, one needs a methodology that supports the development process as common in other disciplines. In recent years, several such methodologies and model...
Onn Shehory, Arnon Sturm
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
13 years 7 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny
DSN
2008
IEEE
14 years 2 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell