Sciweavers

653 search results - page 88 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
ICSE
2003
IEEE-ACM
14 years 8 months ago
Model-based Simulation of Web Applications for Usability Assessment
In this paper we discuss an approach for simulating the behaviour of interactive software systems, before starting on any of the actual implementation, based on a model of the sys...
Robert Chatley, Jeff Kramer, Jeff Magee, Sebasti&a...
ESORICS
2008
Springer
13 years 9 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
IPCCC
2006
IEEE
14 years 1 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
ATAL
2007
Springer
14 years 2 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak
ASPLOS
2000
ACM
14 years 7 days ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin