Sciweavers

1795 search results - page 212 / 359
» Security Models and Information Flow
Sort
View
IEEEARES
2008
IEEE
15 years 11 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
136
Voted
PG
2003
IEEE
15 years 9 months ago
Illustration Watermarks for Vector Graphics
Digital watermarking is a technique for embedding information into data, such as images, 3D models, or audio files, such that some properties (i. e., security, imperceptibility, ...
Henry Sonnet, Tobias Isenberg, Jana Dittmann, Thom...
INFSOF
1998
93views more  INFSOF 1998»
15 years 4 months ago
Analysis and design of co-operative work processes: a framework
The main focus of this paper is demonstrating a methodology for capturing and designing co-operative work processes. We present a method, appropriate for group work analysis, and ...
Selmin Nurcan
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
15 years 10 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
CCS
2009
ACM
15 years 11 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...