Sciweavers

2270 search results - page 238 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ESORICS
2006
Springer
15 years 8 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
IJNSEC
2007
144views more  IJNSEC 2007»
15 years 4 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
CSFW
2005
IEEE
15 years 10 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
EUROCRYPT
2012
Springer
13 years 7 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
CLEF
2008
Springer
15 years 6 months ago
Overview of WebCLEF 2008
We describe the WebCLEF 2008 task. Similarly to the 2007 edition of WebCLEF, the 2008 edition implements a multilingual "information synthesis" task, where, for a given t...
Valentin Jijkoun, Maarten de Rijke