Sciweavers

1407 search results - page 13 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 1 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
IASTEDSEA
2004
13 years 9 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
COMGEO
2010
ACM
13 years 11 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
SYNTHESE
2010
68views more  SYNTHESE 2010»
13 years 6 months ago
Informational versus functional theories of scientific representation
Recent work in the philosophy of science has generated an apparent conflict between theories attempting to explicate the nature of scientific representation. On one side, there are...
Anjan Chakravartty