Sciweavers

1795 search results - page 108 / 359
» Security Models and Information Flow
Sort
View
101
Voted
CAISE
2006
Springer
15 years 7 months ago
Goal-oriented Analysis of Regulations
This paper explains how goal-oriented requirements engineering can be transposed into regulation modelling. It motivates also why this way of modelling regulations is worthwhile fo...
Robert Darimont, Michel Lemoine
126
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
139
Voted
ER
1998
Springer
147views Database» more  ER 1998»
15 years 8 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...
124
Voted
PET
2009
Springer
15 years 10 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß
138
Voted
SOUPS
2010
ACM
15 years 7 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash