Sciweavers

67 search results - page 11 / 14
» Toward a Mathematical Foundation for Information Flow Securi...
Sort
View
ENTCS
2007
110views more  ENTCS 2007»
13 years 7 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
ISBI
2006
IEEE
14 years 8 months ago
The Renal Physiome Project
We discuss current progress towards two complementary web resources being developed for the Renal Physiome: (1) a database (QKDB) for quantitative and anatomical data at all level...
S. Randall Thomas, Fariza Tahi, Peter Harris, Andr...
CHI
2010
ACM
13 years 10 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
CCS
2005
ACM
14 years 28 days ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
CCS
2010
ACM
13 years 7 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps