Sciweavers

556 search results - page 40 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
ACIIDS
2010
IEEE
171views Database» more  ACIIDS 2010»
15 years 2 months ago
Evolving Concurrent Petri Net Models of Epistasis
Abstract. A genetic algorithm is used to learn a non-deterministic Petri netbased model of non-linear gene interactions, or statistical epistasis. Petri nets are computational mode...
Michael Mayo, Lorenzo Beretta
NDSS
2009
IEEE
15 years 6 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
JCP
2008
142views more  JCP 2008»
14 years 11 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
CSFW
2012
IEEE
13 years 2 months ago
Generic Indifferentiability Proofs of Hash Designs
—In this paper, we propose a formal analysis of domain extenders for hash functions in the indifferentiability framework. We define a general model for domain extenders and prov...
Marion Daubignard, Pierre-Alain Fouque, Yassine La...
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 6 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...