Sciweavers

67 search results - page 7 / 14
» Toward a Mathematical Foundation for Information Flow Securi...
Sort
View
IJCINI
2007
139views more  IJCINI 2007»
13 years 7 months ago
AURELLIO: A Cognitive Computational Knowledge Representation Theory
: Cognitive informatics (CI) studies the natural intelligence and internal information processing mechanisms of the brain, as well as the processes involved in perception and cogni...
Mehdi Najjar, André Mayers
FOSAD
2000
Springer
13 years 11 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
AISS
2010
117views more  AISS 2010»
13 years 4 months ago
A Geospatial Service Approach towards the Development of a Debris Flow Early-warning Systems
Disaster prevention and management is a complicated task that often involves a tremendous volume of heterogeneous data from various resources. With its dynamic and distributed nat...
Min-Lang Huang, Jung-Hong Hong
TRUST
2009
Springer
14 years 2 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
ISW
2009
Springer
14 years 1 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel