Sciweavers

1795 search results - page 127 / 359
» Security Models and Information Flow
Sort
View
ASIASIM
2004
Springer
15 years 9 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...
APSEC
2003
IEEE
15 years 9 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
TC
2008
15 years 3 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
139
Voted
ICPR
2008
IEEE
16 years 5 months ago
Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm
In this contribution we introduce the Shape Flow algorithm (SF), a novel method for spatio-temporal 3D pose estimation of a 3D parametric curve. The SF is integrated into a tracki...
Markus Hahn, Lars Krüger, Christian Wöhl...
CSC
2006
15 years 5 months ago
An Adaptive Method for Flow Simulation in Three-Dimensional Heterogeneous Discrete Fracture Networks
Natural fractured media are highly unpredictable because of existing complex structures at the fracture and at the network levels. Fractures are by themselves heterogeneous objects...
Hussein Mustapha