Sciweavers

1875 search results - page 87 / 375
» Modeling the Security of Steganographic Systems
Sort
View
84
Voted
UIALL
2004
Springer
15 years 6 months ago
Adaptive User Modelling in AthosMail
In this paper we discuss the adaptive User Model component of the AthosMail system, and describe especially the Cooperativity Model which produces recommendations for the appropria...
Kristiina Jokinen, Kari Kanto, Jyrki Rissanen
120
Voted
APGV
2008
ACM
164views Visualization» more  APGV 2008»
15 years 2 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
98
Voted
CSREASAM
2006
15 years 2 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
95
Voted
FOSSACS
2010
Springer
15 years 7 months ago
The Complexity of Synchronous Notions of Information Flow Security
The paper considers the complexity of verifying that a finite state system satisfies a number of definitions of information flow security. The systems model considered is one i...
Franck Cassez, Ron van der Meyden, Chenyi Zhang
94
Voted
PCI
2009
Springer
15 years 5 months ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis