Sciweavers

1407 search results - page 49 / 282
» Systems Theory Model for Information Security
Sort
View
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 8 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
JCS
2011
74views more  JCS 2011»
13 years 3 months ago
Model-checking trace-based information flow properties
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic te...
Deepak D'Souza, Raveendra Holla, K. R. Raghavendra...
CCS
2011
ACM
12 years 8 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
HOLOMAS
2005
Springer
14 years 1 months ago
An Information-Based Agent
Information-based agency is founded on two observations: everything in an agent’s world model is uncertain, and everything that an agent communicates gives away valuable informa...
John K. Debenham