Sciweavers

5722 search results - page 70 / 1145
» Security Function Interactions
Sort
View
IEEEARES
2007
IEEE
14 years 3 months ago
Secure Distributed Dossier Management in the Legal Domain
The use of digital dossiers in Courts of Law, although currently in the phase of study, will be common practice in the future. This paper introduces the notion of distributed digi...
Martijn Warnier, Frances M. T. Brazier, Martin Api...
CSFW
2006
IEEE
14 years 13 days ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
CRISIS
2009
13 years 9 months ago
Modeling dependencies in security risk management
This paper develops a framework for analyzing security risk dependencies in organizations and ranking the risks. The framework captures how risk `diffuses' via complex interac...
Tansu Alpcan, Nicholas Bambos
ACISP
1999
Springer
14 years 1 months ago
On the Symmetric Property of Homogeneous Boolean Functions
We use combinatorial methods and permutation groups to classify homogeneous boolean functions. The property of symmetry of a boolean function limits the size of the function’s cl...
Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
CEC
2010
IEEE
13 years 9 months ago
Cooperative Co-evolution with delta grouping for large scale non-separable function optimization
— Many evolutionary algorithms have been proposed for large scale optimization. Parameter interaction in nonseparable problems is a major source of performance loss specially on ...
Mohammad Nabi Omidvar, Xiaodong Li, Xin Yao