Sciweavers

335 search results - page 16 / 67
» Reasoning about Probabilistic Security Using Task-PIOAs
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 11 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
DLOG
2009
13 years 8 months ago
Using Description Logics in Relation Based Access Control
Relation Based Access Control (RelBAC) is an access control model designed for the new scenarios of access control on Web 2.0. Under this model, we discuss in this paper how to for...
Rui Zhang, Alessandro Artale, Fausto Giunchiglia, ...
ECSQARU
2005
Springer
14 years 1 months ago
Probabilistic Graphical Models for the Diagnosis of Analog Electrical Circuits
We describe an algorithm to build a graphical model—more precisely: a join tree representation of a Markov network—for a steady state analog electrical circuit. This model can ...
Christian Borgelt, Rudolf Kruse
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 2 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
LICS
2010
IEEE
13 years 6 months ago
A Generic Operational Metatheory for Algebraic Effects
—We provide a syntactic analysis of contextual preorder and equivalence for a polymorphic programming language with effects. Our approach applies uniformly across a range of alge...
Patricia Johann, Alex Simpson, Janis Voigtlän...