Sciweavers

6555 search results - page 38 / 1311
» Secure attribute-based systems
Sort
View
IEEESP
2011
13 years 6 days ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
TSMC
2002
135views more  TSMC 2002»
13 years 8 months ago
Fuzzy decision tree, linguistic rules and fuzzy knowledge-based network: generation and evaluation
A fuzzy knowledge-based network is developed based on the linguistic rules extracted from a fuzzy decision tree. A scheme for automatic linguistic discretization of continuous attr...
Sushmita Mitra, Kishori M. Konwar, Sankar K. Pal
JCDL
2011
ACM
218views Education» more  JCDL 2011»
12 years 11 months ago
Retrieving attributes using web tables
In this paper we propose an attribute retrieval approach which extracts and ranks attributes from Web tables. We use simple heuristics to filter out improbable attributes and we ...
Arlind Kopliku, Karen Pinel-Sauvagnat, Mohand Boug...
QSIC
2007
IEEE
14 years 3 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
ESORICS
2008
Springer
13 years 10 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen