Sciweavers

1597 search results - page 14 / 320
» Mental Models of Computer Security
Sort
View
KR
2004
Springer
15 years 5 months ago
Observation Expectation Reasoning in Agent Systems
The computational grounding problem – the gap between the mental models of an agent and its computational model – is a well known problem within the agent research community. ...
Bình Vu Trân, James Harland, Margaret...
IJNSEC
2008
88views more  IJNSEC 2008»
14 years 11 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
ISI
2006
Springer
14 years 11 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
CCS
2010
ACM
15 years 6 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
PROVSEC
2009
Springer
15 years 6 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang