Sciweavers

1407 search results - page 50 / 282
» Systems Theory Model for Information Security
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
CORR
2004
Springer
104views Education» more  CORR 2004»
13 years 7 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
POPL
2006
ACM
14 years 8 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
INFFUS
2010
143views more  INFFUS 2010»
13 years 6 months ago
A multi-agent systems approach to distributed bayesian information fusion
This paper introduces design principles for modular Bayesian fusion systems which can (i) cope with large quantities of heterogeneous information and (ii) can adapt to changing co...
Gregor Pavlin, Patrick de Oude, Marinus Maris, Jan...
CCS
2007
ACM
14 years 2 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder