Sciweavers

762 search results - page 51 / 153
» Modeling and Simulating Information Security Management
Sort
View
DBSEC
2007
106views Database» more  DBSEC 2007»
13 years 9 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
CONTEXT
2007
Springer
14 years 1 months ago
OCCAM: Ontology-Based Computational Contextual Analysis and Modeling
The ability to model cognitive agents depends crucially on being able to encode and infer with contextual information at many levels (such as situational, psychological, social, or...
Srini Narayanan, Katie Sievers, Steven J. Maiorano
KIVS
2007
Springer
14 years 1 months ago
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks
Abstract. Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper...
Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterb...
MOBIHOC
2008
ACM
14 years 7 months ago
Generic mobility simulation framework (GMSF)
Vehicular ad-hoc networks with inter-vehicular communications are a prospective technology which contributes to safer and more efficient roads and offers information and entertain...
Rainer Baumann, Franck Legendre, Philipp Sommer
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 7 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...