Sciweavers

2270 search results - page 55 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
14 years 2 months ago
The Mobile Internet: The Pioneering Users' Adoption Decisions
Substantial financial and technological investments by private and public organizations have resulted in the delivery of the third generation mobile technologies, although the jou...
Ann Fogelgren-Pedersen
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
14 years 2 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier
CDC
2009
IEEE
140views Control Systems» more  CDC 2009»
14 years 1 months ago
Model reduction, optimal prediction, and the Mori-Zwanzig representation of Markov chains
— Model reduction methods from diverse fields— including control, statistical mechanics and economics—aimed at systems that can be represented by Markov chains, are discusse...
Carolyn L. Beck, Sanjay Lall, Tzuchen Liang, Matth...
ESORICS
1994
Springer
14 years 24 days ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
CCS
2008
ACM
13 years 10 months ago
EON: modeling and analyzing dynamic access control systems with logic programs
We present EON, a logic-programming language and tool that can be used to model and analyze dynamic access control systems. Our language extends Datalog with some carefully design...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani...