Sciweavers

1795 search results - page 122 / 359
» Security Models and Information Flow
Sort
View
105
Voted
COLING
1992
15 years 5 months ago
Preferred Argument Structure For Discourse Understanding
The main purpose of communication is to exchange information. Any discourse understanding model should be able to process the flow of information throughout the entire text. Accor...
Ka-Wai Chui
135
Voted
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 3 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
154
Voted
APN
2008
Springer
15 years 5 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
ICALP
2007
Springer
15 years 10 months ago
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Motivated by the challenging task of designing “secure” vote storage mechanisms, we study information storage mechanisms that operate in extremely hostile environments. In suc...
Tal Moran, Moni Naor, Gil Segev
143
Voted
ISI
2006
Springer
15 years 3 months ago
Inferring Privacy Information from Social Networks
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...
Jianming He, Wesley W. Chu, Zhenyu Liu