Sciweavers

762 search results - page 72 / 153
» Modeling and Simulating Information Security Management
Sort
View
WSC
2007
13 years 10 months ago
Expecting the unexpected: representing, reasoning about, and assessing construction project contingencies
Planning, scheduling and effective management of contingencies are crucial for the successful management of construction projects. In this paper we explore a mathematical represen...
G. Ryan Anderson, Nilufer Onder, Amlan Mukherjee
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
14 years 1 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
ISCI
2007
84views more  ISCI 2007»
13 years 7 months ago
Simulating continuous fuzzy systems
: In our book to appear in print from Springer-Verlag GmbH, Simulating Continuous Fuzzy Systems, Buckley and Jowers, we use crisp continuous simulation under Matlab™/Simulink™ ...
Leonard J. Jowers, James J. Buckley, Kevin D. Reil...
CCS
2010
ACM
14 years 2 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
IADIS
2003
13 years 9 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...