Sciweavers

762 search results - page 23 / 153
» Modeling and Simulating Information Security Management
Sort
View
DIM
2005
ACM
15 years 3 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
WSC
2001
15 years 3 months ago
Seamless integration of layout and simulation
This document talks about the usage of Simulation Data Exchange (SDX) (Moorthy 1999) in order to enable a consistent digital model of automotive factories. The scope of the digita...
Karsten Mecklenburg
ITCC
2003
IEEE
15 years 7 months ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...
CAISE
2006
Springer
15 years 5 months ago
Validation of Regulation Documents by Automated Analysis of Formal Models
Abstract. The security of civil aviation is regulated by a series of international standards and recommended practices. The EDEMOI project aims at investigating different technique...
Didier Bert, Fabrice Bouquet, Yves Ledru, Sylvie V...
ATAL
2011
Springer
14 years 1 months ago
AgentC: agent-based system for securing maritime transit
Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-ba...
Michal Jakob, Ondrej Vanek, Branislav Bosansk&yacu...