Sciweavers

1795 search results - page 156 / 359
» Security Models and Information Flow
Sort
View
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 10 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
IIWAS
2003
15 years 5 months ago
The Effect of Information Seeking Behavior on an Online Purchase Intention
This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Paulus Insap Santosa
117
Voted
OOPSLA
1989
Springer
15 years 8 months ago
A Denotational Semantics of Inheritance and its Correctness
This paper presents a denotational model of inheritance. The model is based on an intuitive motivation of inheritance as a mechanism for deriving modified versions of recursive d...
William R. Cook, Jens Palsberg
ESORICS
2008
Springer
15 years 5 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
152
Voted
JECR
2000
136views more  JECR 2000»
15 years 3 months ago
Modeling the Supply-Demand Interaction in Electronic Commerce: A Bi-Level Programming Approach
The purpose of this paper consists in establishing the model for the supply-demand interaction in the age of electronic commerce. First of all, the study uses the individual objec...
Daniel Y. Shee, Tzung-I Tang, Gwo-Hshiung Tzeng