Sciweavers

1790 search results - page 236 / 358
» On Privacy Models for RFID
Sort
View
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
15 years 10 months ago
Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web
In this paper, we describe data support in an information system to support contextual, online negotiation of privacy contracts for e-commerce on the Semantic Web. Context is impo...
Yingxin (Sheila) He, Dawn N. Jutla
IEEEARES
2006
IEEE
15 years 10 months ago
Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets
Failure diagnosis in large and complex systems is a critical task. A discrete event system (DES) approach to the problem of failure diagnosis is presented in this paper. A classic...
Calin Ciufudean, Adrian Graur, Constantin Filote, ...
172
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
CSFW
2005
IEEE
15 years 9 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
15 years 9 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara