Sciweavers

1235 search results - page 156 / 247
» Formalizing information security knowledge
Sort
View
SACMAT
2010
ACM
14 years 20 days ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SICHERHEIT
2008
13 years 9 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
PERCOM
2004
ACM
14 years 7 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
VISSYM
2007
13 years 10 months ago
TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems
We present TrustNeighborhoods, a security trust visualization for situational awareness on the Internet aimed at novice and intermediate users of a distributed file sharing system...
Niklas Elmqvist, Philippas Tsigas
ATAL
2009
Springer
14 years 2 months ago
Rational play and rational beliefs under uncertainty
Alternating-time temporal logic (atl) is one of the most influential logics for reasoning about agents’ abilities. Constructive Strategic Logic (csl) is a variant of atl for im...
Nils Bulling, Wojciech Jamroga