Sciweavers

37 search results - page 2 / 8
» Causal Security
Sort
View
USS
2008
13 years 9 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
JOCN
2010
103views more  JOCN 2010»
13 years 2 months ago
Functional Neuroimaging Can Support Causal Claims about Brain Function
Cognitive neuroscientists habitually deny that functional neuroimaging can furnish causal information about the relationship between brain events and behavior. However, imaging st...
Matthew J. Weber, Sharon L. Thompson-Schill
INFOCOM
2007
IEEE
14 years 1 months ago
The Causal Factors Behind Internet Power-Law Connectivity
— In this paper, we investigate the impact of layer-2 devices on our perception of the Internet IP topology and on the performance and security of the Internet. We make the case ...
Sangmin Kim, Khaled Harfoush
CSFW
1992
IEEE
13 years 11 months ago
Secure Dependencies with Dynamic Level Assignments
Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical sy...
Pierre Bieber, Frédéric Cuppens
ISF
2007
104views more  ISF 2007»
13 years 7 months ago
Overcoming organizational challenges to secure knowledge management
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Finn Olav Sveen, Eliot Rich, Matthew Jager