Sciweavers

3814 search results - page 68 / 763
» Extensible Information Brokers
Sort
View
IFIP
1992
Springer
15 years 8 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
COCOON
2007
Springer
15 years 11 months ago
Information Distance from a Question to an Answer
We provide three key missing pieces of a general theory of information distance [3, 23, 24]. We take bold steps in formulating a revised theory to avoid some pitfalls in practical...
Ming Li
TPHOL
2005
IEEE
15 years 10 months ago
Verifying a Secure Information Flow Analyzer
Abstract. Denotational semantics for a substantial fragment of Java is formalized by deep embedding in PVS, making extensive use of dependent types. A static analyzer for secure in...
David A. Naumann
ICPR
2002
IEEE
15 years 9 months ago
Generalized Pattern Spectra Sensitive to Spatial Information
Morphological pattern spectra computed from granulometries are frequently used to classify the size classes of details in textures and images. An extension of this technique, whic...
Michael H. F. Wilkinson
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 10 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James