Sciweavers

2979 search results - page 260 / 596
» Modelling secure multiagent systems
Sort
View
ISF
2008
114views more  ISF 2008»
15 years 5 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
EUROSYS
2008
ACM
16 years 2 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
NSPW
2004
ACM
15 years 10 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
JMM2
2008
84views more  JMM2 2008»
15 years 5 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
ICMAS
1998
15 years 6 months ago
How to Explore your Opponent's Strategy (almost) Optimally
This work presents a lookahead-based exploration strategy for a model-based learning agent that enables exploration of the opponent's behavior during interaction in a multi-a...
David Carmel, Shaul Markovitch