Sciweavers

211 search results - page 13 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
ICML
2009
IEEE
14 years 8 months ago
GAODE and HAODE: two proposals based on AODE to deal with continuous variables
AODE (Aggregating One-Dependence Estimators) is considered one of the most interesting representatives of the Bayesian classifiers, taking into account not only the low error rate...
Ana M. Martínez, José A. Gáme...
ESORICS
2000
Springer
13 years 11 months ago
Checking Secure Interactions of Smart Card Applets
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
JCS
2002
132views more  JCS 2002»
13 years 7 months ago
Checking Secure Interactions of Smart Card Applets: Extended Version
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
SACMAT
2003
ACM
14 years 25 days ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu