Sciweavers

2270 search results - page 179 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
146
Voted
SAT
2009
Springer
91views Hardware» more  SAT 2009»
15 years 10 months ago
VARSAT: Integrating Novel Probabilistic Inference Techniques with DPLL Search
Probabilistic inference techniques can be used to estimate variable bias, or the proportion of solutions to a given SAT problem that fix a variable positively or negatively. Metho...
Eric I. Hsu, Sheila A. McIlraith
103
Voted
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 8 months ago
The Chief Information Officer: A Study of Managerial Roles in Norway
This study provides some empirical insight into managerial roles of chief information officer (CIO) based on Mintzberg's classic managerial role model and CSC's informat...
Petter Gottschalk
122
Voted
RAID
2010
Springer
15 years 2 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
129
Voted
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 10 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
120
Voted
CCS
2007
ACM
15 years 10 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros