Sciweavers

739 search results - page 57 / 148
» Information Flow in Credential Systems
Sort
View
ETRICS
2006
15 years 3 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
HICSS
2006
IEEE
99views Biometrics» more  HICSS 2006»
15 years 5 months ago
Challenges of Treating Information as a Public Resource: The Case of Parcel Data
Land parcels are the foundation for many aspects of public and community life. This report presents the findings of a study of information about land parcels in New York State. It...
Sharon S. Dawes, Meghan E. Cook, Natalie Helbig
KBSE
2007
IEEE
15 years 6 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
CAISE
2003
Springer
15 years 5 months ago
Information Dissemination based on Semantic Relations
In a selective information dissemination (SDI) system, users submit profiles consisting of a number of long-standing queries to represent their information needs. The system then c...
Irini-Electra Katzagiannaki, Dimitris Plexousakis
EUROPAR
2009
Springer
15 years 4 months ago
Capturing and Visualizing Event Flow Graphs of MPI Applications
A high-level understanding of how an application executes and which performance characteristics it exhibits is essential in many areas of high performance computing, such as applic...
Karl Fürlinger, David Skinner