Sciweavers

410 search results - page 34 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
WISA
2004
Springer
14 years 1 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
PTS
2008
123views Hardware» more  PTS 2008»
13 years 9 months ago
Model-Based Firewall Conformance Testing
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
NDSS
2000
IEEE
14 years 1 days ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
BMCBI
2011
12 years 11 months ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...
BMCBI
2008
90views more  BMCBI 2008»
13 years 7 months ago
Genome-scale study of the importance of binding site context for transcription factor binding and gene regulation
Background: The rate of mRNA transcription is controlled by transcription factors that bind to specific DNA motifs in promoter regions upstream of protein coding genes. Recent res...
Jakub Orzechowski Westholm, Feifei Xu, Hans Ronne,...