Sciweavers

1422 search results - page 102 / 285
» Information security and risk management
Sort
View
ISI
2006
Springer
13 years 10 months ago
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
Clayton T. Morrison, Paul R. Cohen
CCS
2006
ACM
14 years 1 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
PERCOM
2007
ACM
14 years 9 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
ISW
2009
Springer
14 years 4 months ago
Security Analysis of the PACE Key-Agreement Protocol
We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Secur...
Jens Bender, Marc Fischlin, Dennis Kügler
ACSW
2003
13 years 11 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton