Sciweavers

762 search results - page 23 / 153
» Modeling and Simulating Information Security Management
Sort
View
DIM
2005
ACM
13 years 9 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
WSC
2001
13 years 9 months ago
Seamless integration of layout and simulation
This document talks about the usage of Simulation Data Exchange (SDX) (Moorthy 1999) in order to enable a consistent digital model of automotive factories. The scope of the digita...
Karsten Mecklenburg
ITCC
2003
IEEE
14 years 27 days ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...
CAISE
2006
Springer
13 years 11 months ago
Validation of Regulation Documents by Automated Analysis of Formal Models
Abstract. The security of civil aviation is regulated by a series of international standards and recommended practices. The EDEMOI project aims at investigating different technique...
Didier Bert, Fabrice Bouquet, Yves Ledru, Sylvie V...
ATAL
2011
Springer
12 years 7 months ago
AgentC: agent-based system for securing maritime transit
Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-ba...
Michal Jakob, Ondrej Vanek, Branislav Bosansk&yacu...