Sciweavers

1407 search results - page 22 / 282
» Systems Theory Model for Information Security
Sort
View
IFIP
2007
Springer
14 years 2 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 8 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 1 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
ATAL
2007
Springer
14 years 2 months ago
The Examination of an Information-Based Approach to Trust
This article presents the results of experiments performed with agents based on an operalization of an information-theoretic model for trust. Experiments have been performed with t...
Maaike Harbers, Rineke Verbrugge, Carles Sierra, J...
AGENTS
1997
Springer
14 years 3 days ago
Integrating Communicative Action, Conversations and Decision Theory to Coordinate Agents
The coordination problem in multi-agent systems is the problem of managing dependencies between the activities of autonomous agents, in conditions of incomplete knowledge about th...
Mihai Barbuceanu, Mark S. Fox