Sciweavers

1414 search results - page 22 / 283
» Combining Intruder Theories
Sort
View
ATAL
2003
Springer
14 years 3 months ago
Scheduling tasks with precedence constraints to solicit desirable bid combinations
In our previous research we suggested an approach to maximizing agents preferences over schedules of multiple tasks with temporal and precedence constraints. The proposed approach...
Alexander Babanov, John Collins, Maria L. Gini
IEEEARES
2009
IEEE
14 years 4 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
ISW
2004
Springer
14 years 3 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
PSD
2010
Springer
108views Database» more  PSD 2010»
13 years 8 months ago
Disclosure Risk of Synthetic Population Data with Application in the Case of EU-SILC
In survey statistics, simulation studies are usually performed by repeatedly drawing samples from population data. Furthermore, population data may be used in courses on survey sta...
Matthias Templ, Andreas Alfons
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell