Sciweavers

831 search results - page 90 / 167
» A Security Concept for OLAP
Sort
View
ICARIS
2004
Springer
15 years 5 months ago
Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of ...
Uwe Aickelin, Julie Greensmith, Jamie Twycross
ACISP
2003
Springer
15 years 5 months ago
An Anonymous Credential System and a Privacy-Aware PKI
Abstract. In this paper we present a non-transferable anonymous credential system that is based on the concept of a chameleon certificate. A chameleon certificate is a special ce...
Pino Persiano, Ivan Visconti
ACSAC
2002
IEEE
15 years 4 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
ACISP
2001
Springer
15 years 4 months ago
Improving the Availability of Time-Stamping Services
We discuss the availability questions that arise when digital time stamps are used for preserving the evidentiary value of electronic documents. We analyze the time-stamping protoc...
Arne Ansper, Ahto Buldas, Märt Saarepera, Jan...
AGENTS
2001
Springer
15 years 4 months ago
Improving the agent-oriented modeling process by roles
The agent-oriented modeling process is divided in a typical sequence of activities, i.e., requirements specification, analysis, and design. The requirements are specified by des...
Ralph Depke, Reiko Heckel, Jochen Malte Küste...