Sciweavers

378 search results - page 64 / 76
» Security requirement analysis of business processes
Sort
View
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 1 months ago
A Novel Concept: Message Driven Frequency Hopping (MDFH)
—Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems,...
Qi Ling, Tongtong Li, Zhi Ding
IJISEC
2008
119views more  IJISEC 2008»
13 years 7 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
WPES
2006
ACM
14 years 1 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
OTM
2005
Springer
14 years 1 months ago
Semantics of Agent-Based Service Delegation and Alignment
In this paper we will concentrate on the conceptual modeling and semantics of service delegation and alignment in information systems. In delegation, one typically has the situatio...
Herman Balsters, G. B. Huitema, Nicolae B. Szirbik
FOSSACS
2009
Springer
14 years 2 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...