Sciweavers

1875 search results - page 53 / 375
» Modeling the Security of Steganographic Systems
Sort
View
FOSAD
2000
Springer
14 years 2 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
CSREASAM
2006
14 years 12 days ago
Modelling to Enhance GSM Network Security
With the rapid development in global communication networks, the threat of security and in particular that of cellular telecommunication system is real and highly dangerous. Mobil...
Johnnes Arreymbi
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
14 years 4 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 9 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
WWW
2008
ACM
14 years 11 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang