Sciweavers

3811 search results - page 111 / 763
» The Safe-Tcl Security Model
Sort
View
144
Voted
AINA
2007
IEEE
15 years 11 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
161
Voted
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 10 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
146
Voted
AGENTS
1999
Springer
15 years 9 months ago
An Adaptive Agent Bidding Strategy Based on Stochastic Modeling
For a dynamic, evolving multiagent auction, we have developed an adaptive agent bidding strategy (called the p-strategy) based on stochastic modeling. The p-strategy takes into ac...
Sunju Park, Edmund H. Durfee, William P. Birmingha...
MMMACNS
2001
Springer
15 years 9 months ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman
ESORICS
2011
Springer
14 years 4 months ago
A New RFID Privacy Model
This paper critically examines some recently proposed RFID privacy models. It shows that some models suffer from weaknesses such as insufficient generality and unrealistic assumpt...
Jens Hermans, Andreas Pashalidis, Frederik Vercaut...