Sciweavers

1795 search results - page 141 / 359
» Security Models and Information Flow
Sort
View
KI
1999
Springer
15 years 8 months ago
Agents in Traffic Modelling - From Reactive to Social Behaviour
In modern societies the demand for mobility is increasing daily. Hence, one challenge to researchers dealing with traffic and transportation is to find efficient ways to model and ...
Ana L. C. Bazzan, Joachim Wahle, Franziska Klü...
INFOCOM
2005
IEEE
15 years 9 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
134
Voted
CCS
2009
ACM
15 years 10 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
150
Voted
USS
2008
15 years 6 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
ICICS
2004
Springer
15 years 9 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...