Sciweavers

1597 search results - page 264 / 320
» Mental Models of Computer Security
Sort
View
103
Voted
ATAL
2005
Springer
15 years 7 months ago
Law-governed Linda as a semantics for agent dialogue protocols
Tuple spaces and the associated Linda language are a popular model for distributed computation, and Law-Governed Linda (LGL) is a variant allowing processes to have differential ...
Sylvie Doutre, Peter McBurney, Michael Wooldridge
DRM
2005
Springer
15 years 7 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
FOSSACS
2005
Springer
15 years 7 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
GCC
2004
Springer
15 years 7 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
CSE
2009
IEEE
15 years 6 months ago
Quantifying Reciprocity in Social Networks
In this paper we propose a new reciprocity index for quantifying social relationships based on mobile phone call detail records and Twitter blogs. We use this reciprocity index to ...
Huiqi Zhang, Ram Dantu, João W. Cangussu