Sciweavers

1235 search results - page 110 / 247
» Formalizing information security knowledge
Sort
View
MFCS
2010
Springer
13 years 6 months ago
Asynchronous Omega-Regular Games with Partial Information
We address the strategy problem for ω-regular two-player games with partial information, played on finite game graphs. We consider two different kinds of observability on a gene...
Bernd Puchala
AIME
2007
Springer
13 years 12 months ago
Using Temporal Context-Specific Independence Information in the Exploratory Analysis of Disease Processes
Abstract. Disease processes in patients are temporal in nature and involve uncertainty. It is necessary to gain insight into these processes when aiming at improving the diagnosis,...
Stefan Visscher, Peter J. F. Lucas, Ildikó ...
INFFUS
2006
101views more  INFFUS 2006»
13 years 8 months ago
Fusion rules for merging uncertain information
In previous papers, we have presented a logic-based framework based on fusion rules for merging structured news reports [Hun00, Hun02b, Hun02a, HS03, HS04]. Structured news report...
Anthony Hunter, Weiru Liu
CCS
2010
ACM
14 years 2 months ago
Bureaucratic protocols for secure two-party sorting, selection, and permuting
In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P...
Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenlia...
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
13 years 11 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...