Sciweavers

1407 search results - page 66 / 282
» Systems Theory Model for Information Security
Sort
View
IJON
1998
158views more  IJON 1998»
13 years 7 months ago
Bayesian Kullback Ying-Yang dependence reduction theory
Bayesian Kullback Ying—Yang dependence reduction system and theory is presented. Via stochastic approximation, implementable algorithms and criteria are given for parameter lear...
Lei Xu
ISJ
2002
84views more  ISJ 2002»
13 years 7 months ago
Transaction attributes and software outsourcing success: an empirical investigation of transaction cost theory
In recent years, an increasing amount of attention has been paid to information systems (IS) outsourcing by practitioners as well as academics. However, our understanding of the fa...
Eric T. G. Wang
UTP
2010
13 years 6 months ago
On Modelling User Observations in the UTP
This paper presents an approach for modelling interactions between users and systems in the Unifying Theories of Programming. Working in the predicate calculus, we outline generic ...
Michael J. Banks, Jeremy L. Jacob
CCS
2005
ACM
14 years 1 months ago
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-l...
Santiago Escobar, Catherine Meadows, José M...
INFOCOM
2010
IEEE
13 years 6 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...