Sciweavers

1407 search results - page 81 / 282
» Systems Theory Model for Information Security
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 8 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
ACISP
2004
Springer
14 years 1 months ago
Single Database Private Information Retrieval with Logarithmic Communication
In this paper, we study the problem of single database private information retrieval, and present schemes with only logarithmic server-side communication complexity. Previously th...
Yan-Cheng Chang
ISI
2006
Springer
13 years 8 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
BMCBI
2010
129views more  BMCBI 2010»
13 years 8 months ago
Detection of distant evolutionary relationships between protein families using theory of sequence profile-profile comparison
Background: Detection of common evolutionary origin (homology) is a primary means of inferring protein structure and function. At present, comparison of protein families represent...
Mindaugas Margelevicius, Ceslovas Venclovas
SACMAT
2010
ACM
14 years 28 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum