Sciweavers

211 search results - page 6 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
AMAI
2006
Springer
13 years 7 months ago
Functional and multivalued dependencies in nested databases generated by record and list constructor
tor. In order to capture different data models at a time, an abstract algebraic approach based on nested attributes is taken. The presence of the list constructor calls for a new i...
Sven Hartmann, Sebastian Link, Klaus-Dieter Schewe
CSFW
1992
IEEE
13 years 11 months ago
Secure Dependencies with Dynamic Level Assignments
Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical sy...
Pierre Bieber, Frédéric Cuppens
BIRTHDAY
2003
Springer
14 years 24 days ago
A Formal Basis for Reasoning on Programmable QoS
Abstract. The explicit management of Quality of Service (QoS) of network connectivity, such as, e.g., working cost, transaction support, and security, is a key requirement for the ...
Rocco De Nicola, Gian Luigi Ferrari, Ugo Montanari...
ISORC
2008
IEEE
14 years 1 months ago
QoS Aware Dependable Distributed Stream Processing
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream ...
Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sand...