Sciweavers

1790 search results - page 284 / 358
» On Privacy Models for RFID
Sort
View
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
15 years 5 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
142
Voted
IADIS
2003
15 years 4 months ago
User Profile Based Smart Information Filtering in Smartcard
Finding effectively relevant information is becoming challenging task. In this paper, we propose a smart information filtering system SIM-Filter that integrates user’s identity ...
Abdelkrim Lahlou, Pascal Urien
172
Voted
FORTE
2009
15 years 1 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
185
Voted
SERVICES
2010
201views more  SERVICES 2010»
14 years 10 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
CSFW
2008
IEEE
15 years 10 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang