Sciweavers

2270 search results - page 212 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
IACR
2011
129views more  IACR 2011»
14 years 3 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
150
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 5 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
IEEEARES
2006
IEEE
15 years 10 months ago
Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty
In many reliability studies based on data, reliability engineers face incompleteness and incoherency problems in the data. Probabilistic tools badly handle these kinds of problems...
Christophe Simon, Philippe Weber
PET
2009
Springer
15 years 10 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso