Sciweavers

2979 search results - page 293 / 596
» Modelling secure multiagent systems
Sort
View
PET
2004
Springer
15 years 10 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
IDEAL
2009
Springer
15 years 9 months ago
The Winning Advantage: Using Opponent Models in Robot Soccer
Opponent modeling is a skill in multi-agent systems (MAS) which attempts to create a model of the behavior of the opponent. This model can be used to predict the future actions of ...
José Antonio Iglesias, Juan Antonio Fern&aa...
IJSN
2008
147views more  IJSN 2008»
15 years 4 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
CCS
2010
ACM
15 years 5 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
15 years 4 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...