Sciweavers

335 search results - page 25 / 67
» Reasoning about Probabilistic Security Using Task-PIOAs
Sort
View
ICOST
2010
Springer
13 years 11 months ago
Use Cases for Abnormal Behaviour Detection in Smart Homes
While people have many ideas about how a smart home should react to particular behaviours from their inhabitant, there seems to have been relatively little attempt to organise this...
An C. Tran, Stephen Marsland, Jens Dietrich, Hans ...
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
CSFW
2009
IEEE
14 years 2 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
UM
2005
Springer
14 years 1 months ago
Bayesphone: Precomputation of Context-Sensitive Policies for Inquiry and Action in Mobile Devices
Inference and decision making with probabilistic user models may be infeasible on portable devices such as cell phones. We highlight the opportunity for storing and using precomput...
Eric Horvitz, Paul Koch, Raman Sarin, Johnson Apac...