Sciweavers

1407 search results - page 45 / 282
» Systems Theory Model for Information Security
Sort
View
SACMAT
2009
ACM
14 years 20 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SIGIR
2002
ACM
13 years 7 months ago
Term-specific smoothing for the language modeling approach to information retrieval: the importance of a query term
This paper follows a formal approach to information retrieval based on statistical language models. By introducing some simple reformulations of the basic language modeling approa...
Djoerd Hiemstra
WPES
2003
ACM
14 years 1 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
CAISE
2006
Springer
13 years 11 months ago
Modeling Airport Security Regulations in Focal
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
David Delahaye, Jean-Frédéric &Eacut...
SAC
2002
ACM
13 years 7 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher