Sciweavers

762 search results - page 7 / 153
» Modeling and Simulating Information Security Management
Sort
View
EEE
2004
IEEE
13 years 11 months ago
Simulation Models and Their Metainfo-Management Using RDF-Based Paradigms
In a catalogue for computer-based models the basic problem is that complex interdependencies between models must be addressed, which are dependent on an application's domain....
Michael C. Jaeger, Moussa Lo, Robert J. Pefferly
HICSS
2002
IEEE
179views Biometrics» more  HICSS 2002»
14 years 16 days ago
Combined Modeling with Multi-agent Systems and Simulation: Its Application to Harbor Supply Chain Management
This paper presents a method for modeling the dynamic behavior of harbor supply chains and evaluating strategic and operational policies of the proposed harbor supply chain by app...
Dong Won Yi, Soung Hie Kim, Nak Hyun Kim
IH
1998
Springer
13 years 11 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
ICPPW
2003
IEEE
14 years 26 days ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
ICPADS
2006
IEEE
14 years 1 months ago
Experiences with Simulations - A Light and Fast Model for Secure Web Applications
Using simulations of a complex system such as a Web Application Server provides us with a tool that allows the running of tests without using the resources needed in a real system...
Ramon Nou, Jordi Guitart, David Carrera, Jordi Tor...