Sciweavers

1407 search results - page 223 / 282
» Systems Theory Model for Information Security
Sort
View
SLOGICA
2008
101views more  SLOGICA 2008»
13 years 9 months ago
A Dynamic-Logical Perspective on Quantum Behavior
In this paper we show how recent concepts from Dynamic Logic, and in particular from Dynamic Epistemic logic, can be used to model and interpret quantum behavior. Our main thesis ...
Alexandru Baltag, Sonja Smets
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 10 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
DOLAP
2004
ACM
14 years 2 months ago
Aggregate queries in peer-to-peer OLAP
A peer-to-peer (P2P) data management system consists essentially of a network of peer systems, each maintaining full autonomy over its own data resources. Data exchange between pe...
Mauricio Minuto Espil, Alejandro A. Vaisman
EUROSYS
2007
ACM
14 years 1 months ago
Discrete control for safe execution of IT automation workflows
As information technology (IT) administration becomes increasingly complex, workflow technologies are gaining popularity for IT automation. Writing correct workflow programs is no...
Yin Wang, Terence Kelly, Stéphane Lafortune
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
13 years 10 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...