Sciweavers

1235 search results - page 118 / 247
» Formalizing information security knowledge
Sort
View
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 9 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ACSW
2004
13 years 9 months ago
Early Assessment of Classification Performance
The ability to distinguish between objects is the fundamental to learning and intelligent behavior in general. The difference between two things is the information we seek; the pr...
Bostjan Brumen, Izidor Golob, Hannu Jaakkola, Tatj...
ICASSP
2010
IEEE
13 years 8 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
CORR
2008
Springer
148views Education» more  CORR 2008»
13 years 8 months ago
Conversion/Preference Games
We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. ...
Stéphane Le Roux, Pierre Lescanne, Ren&eacu...