Sciweavers

1875 search results - page 158 / 375
» Modeling the Security of Steganographic Systems
Sort
View
OTM
2005
Springer
15 years 6 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
ATAL
2011
Springer
14 years 22 days ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
125
Voted
CCS
2008
ACM
15 years 2 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
113
Voted
IACR
2011
129views more  IACR 2011»
14 years 12 days ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
112
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 2 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...