Sciweavers

1407 search results - page 117 / 282
» Systems Theory Model for Information Security
Sort
View
ICDCS
2007
IEEE
14 years 2 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu
RECSYS
2009
ACM
14 years 2 months ago
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models
Previous work on using external aggregate rating information showed that this information can be incorporated in several diļ¬€erent types of recommender systems and improves their...
Akhmed Umyarov, Alexander Tuzhilin
SACMAT
2003
ACM
14 years 1 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
CCS
2008
ACM
13 years 10 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
NDSS
1997
IEEE
14 years 12 days ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...