Sciweavers

1235 search results - page 176 / 247
» Formalizing information security knowledge
Sort
View
AGENTS
2000
Springer
14 years 4 days ago
Scalability of a Transactional Infrastructure for Multi-Agent Systems
Abstract. One of the reasons for attending to agent technology is the evergrowing complexity of information systems and the increasing difficulty to foresee and plan for all potent...
Khaled Nagi
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 7 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
SIGIR
2009
ACM
14 years 2 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
ITNG
2006
IEEE
14 years 1 months ago
Two-Party Private Vector Dominance: The All-Or-Nothing Deal
Alice holds a secret integer a while Bob holds a secret integer b, they want to decide on the predicate a > b with no information revealed other than the result. This is the we...
Maged Hamada Ibrahim
ICPR
2008
IEEE
14 years 9 months ago
Query by table
Querying any information system requires the knowledge of some formal language, making it inaccessible to computer-na?ve potential users. We propose a new intuitive querying mecha...
George Nagy, Raghav K. Padmanabhan