Sciweavers

1875 search results - page 43 / 375
» Modeling the Security of Steganographic Systems
Sort
View
MMMACNS
2001
Springer
14 years 3 months ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman
FUIN
2008
74views more  FUIN 2008»
13 years 11 months ago
Security in a Model for Long-running Transactions
Abstract. Communicating Hierarchical Transaction-based Timed Automata have been introduced to model systems performing long
Damas P. Gruska, Andrea Maggiolo-Schettini, Paolo ...
IFIP
2009
Springer
14 years 5 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
EOR
2007
104views more  EOR 2007»
13 years 11 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 11 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...