Sciweavers

577 search results - page 11 / 116
» Engineering Sufficiently Secure Computing
Sort
View
CCS
2008
ACM
14 years 11 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
77
Voted
COMPSAC
2000
IEEE
15 years 1 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
CONEXT
2006
ACM
15 years 1 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
97
Voted
SIAMCOMP
2011
14 years 4 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 2 months ago
Evolution of a Knowledge Focused Computer Supported Learning System by Ensuring Extensibility through Generalization and Replica
If sufficient attention is not paid to the information models on which Learning Platforms are based the ability to deliver rich functionality is hindered. This paper describes the...
David White, Lesley A. Gardner, Don Sheridan