Sciweavers

1795 search results - page 51 / 359
» Security Models and Information Flow
Sort
View
SP
1990
IEEE
15 years 8 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
ISPDC
2006
IEEE
15 years 10 months ago
Managing Information and Time Flow in an Agent-Based E-Commerce System
Recently, we have proposed a comprehensive agent-based e-commerce system. While UML formalized, it lacked details how basic functions – e.g. user request to purchase a given pro...
Maciej Gawinecki, Maria Ganzha, Pawel Kobzdej, Mar...
ISI
2008
Springer
15 years 4 months ago
Secure remote control model for information appliances
Abstract--Recently, Lee et al. proposed a Remote Authentication Model of Information Appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network o...
Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 8 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ASIASIM
2004
Springer
15 years 9 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...