Sciweavers

202 search results - page 19 / 41
» Foundations for group-centric secure information sharing mod...
Sort
View
AC
1998
Springer
13 years 12 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
POPL
1990
ACM
13 years 11 months ago
Concurrent Constraint Programming
Abstract. Concurrent constraint programming is a simple but powerful framework for computation based on four basic computational ideas: concurrency (multiple agents are simultaneou...
Vijay A. Saraswat, Martin C. Rinard
IEEEARES
2008
IEEE
14 years 2 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
CCS
2010
ACM
14 years 2 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
COMPSAC
2008
IEEE
14 years 2 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang