Sciweavers

5255 search results - page 2 / 1051
» Formal Methods for Privacy
Sort
View
ACSAC
1996
IEEE
13 years 9 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
FOSAD
2005
Springer
13 years 10 months ago
Formal Methods for Smartcard Security
Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards ...
Gilles Barthe, Guillaume Dufay
SAFECOMP
2004
Springer
13 years 10 months ago
Using Formal Methods in a Retrospective Safety Case
Today the development of safety-critical systems is to a large extent guided by standards that make demands on both development process and system quality. Before the advent of the...
Lars-Henrik Eriksson
CIS
2005
Springer
13 years 10 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang
WEBI
2005
Springer
13 years 10 months ago
QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software
We present a generic natural language processing (NLP) architecture, acronym QTIL, based on a system of cooperating multiple agents (Q/A, T, I, and L agents) which can be used in ...
Vlado Keselj, Dawn N. Jutla