Sciweavers

5475 search results - page 133 / 1095
» Model Driven Security
Sort
View
68
Voted
ACL
1997
15 years 2 months ago
Mistake-Driven Mixture of Hierarchical Tag Context Trees
This paper proposes a mistake-driven mixture method for learning a tag model. The method iteratively performs two proce
Masahiko Haruno, Yuji Matsumoto
88
Voted
ACISP
2006
Springer
15 years 4 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
CAISE
2004
Springer
15 years 6 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
114
Voted
FORMATS
2009
Springer
15 years 7 months ago
Analyzing Real-Time Event-Driven Programs
Embedded real-time systems are typically programmed in low-level languages which provide support for event-driven task processing and real-time interrupts. We show that the model c...
Pierre Ganty, Rupak Majumdar