Sciweavers

722 search results - page 77 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
EGOV
2003
Springer
15 years 5 months ago
Local Democracy Shaping e-Democracy
This paper offers a fresh perspective to study the role and implications of information and communications technologies (ICT) in processes of local democracy. It moves away from ea...
Zahid Parvez
RE
2002
Springer
14 years 11 months ago
Security Requirements Engineering: When Anti-Requirements Hit the Fan
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been recent victims of rogue traders. What is paradoxical is that there does not seem to ...
Robert Crook, Darrel C. Ince, Luncheng Lin, Bashar...
WWW
2010
ACM
15 years 5 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
IWIA
2005
IEEE
15 years 5 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
TCS
2008
14 years 11 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld