Sciweavers

762 search results - page 111 / 153
» Modeling and Simulating Information Security Management
Sort
View
CAISE
2001
Springer
14 years 6 days ago
Using UML Action Semantics for Executable Modeling and Beyond
The UML lacks precise and formal foundations for several constructs such as transition guards or method bodies, for which it resorts to semantic loopholes in the form of “uninter...
Gerson Sunyé, François Pennaneac'h, ...
IJAR
2007
104views more  IJAR 2007»
13 years 7 months ago
On representation and aggregation of social evaluations in computational trust and reputation models
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
Jordi Sabater-Mir, Mario Paolucci
CISS
2008
IEEE
14 years 2 months ago
Channel modeling and detector design for dynamic mode high density probe storage
— Probe based data storage is a promising solution for satisfying the demand for ultra-high capacity storage devices. One of the main problems with probe storage devices is the w...
Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy, ...
ISW
2009
Springer
14 years 2 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
IH
2001
Springer
14 years 4 days ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn