Sciweavers

739 search results - page 57 / 148
» Information Flow in Credential Systems
Sort
View
ETRICS
2006
13 years 11 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
HICSS
2006
IEEE
99views Biometrics» more  HICSS 2006»
14 years 1 months ago
Challenges of Treating Information as a Public Resource: The Case of Parcel Data
Land parcels are the foundation for many aspects of public and community life. This report presents the findings of a study of information about land parcels in New York State. It...
Sharon S. Dawes, Meghan E. Cook, Natalie Helbig
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
CAISE
2003
Springer
14 years 29 days ago
Information Dissemination based on Semantic Relations
In a selective information dissemination (SDI) system, users submit profiles consisting of a number of long-standing queries to represent their information needs. The system then c...
Irini-Electra Katzagiannaki, Dimitris Plexousakis
EUROPAR
2009
Springer
14 years 10 days ago
Capturing and Visualizing Event Flow Graphs of MPI Applications
A high-level understanding of how an application executes and which performance characteristics it exhibits is essential in many areas of high performance computing, such as applic...
Karl Fürlinger, David Skinner