Sciweavers

101 search results - page 5 / 21
» Formal approach to security metrics.: what does
Sort
View
AGENTS
2000
Springer
15 years 4 months ago
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
This paper extends earlier work in the use of ‘Agent-based Computational Economics’ (ACE) for modelling the development of co-operation between firms. Inter-firm relations hav...
Bart Nooteboom, Tomas Klos, René J. Jorna
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
16 years 21 days ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
101
Voted
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
15 years 1 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
112
Voted
ESORICS
2008
Springer
15 years 2 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen
90
Voted
SCAM
2008
IEEE
15 years 7 months ago
Parfait - A Scalable Bug Checker for C Code
Parfait is a bug checker of C code that has been designed to address developers’ requirements of scalability (support millions of lines of code in a reasonable amount of time), ...
Cristina Cifuentes