Sciweavers

515 search results - page 59 / 103
» Measuring Voter-Controlled Privacy
Sort
View
IEEEARES
2006
IEEE
14 years 5 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
CSFW
2005
IEEE
14 years 4 months ago
Belief in Information Flow
To reason about information flow based on beliefs, a new model is developed that describes how attacker beliefs change due to the attacker’s observation of the execution of a p...
Michael R. Clarkson, Andrew C. Myers, Fred B. Schn...
ESORICS
2005
Springer
14 years 4 months ago
Sanitizable Signatures
We introduce the notion of sanitizable signatures that offer many attractive security features for certain current and emerging applications. A sanitizable signature allows author...
Giuseppe Ateniese, Daniel H. Chou, Breno de Medeir...
ESORICS
2004
Springer
14 years 4 months ago
A Vector Model of Trust for Developing Trustworthy Systems
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
Indrajit Ray, Sudip Chakraborty
AGENTS
2001
Springer
14 years 3 months ago
Entropy and self-organization in multi-agent systems
Emergent self-organization in multi-agent systems appears to contradict the second law of thermodynamics. This paradox has been explained in terms of a coupling between the macro ...
H. Van Dyke Parunak, Sven Brueckner