Sciweavers

2979 search results - page 475 / 596
» Modelling secure multiagent systems
Sort
View
124
Voted
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 8 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
FC
1998
Springer
156views Cryptology» more  FC 1998»
15 years 7 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
AGENTS
1997
Springer
15 years 7 months ago
Learning View Graphs for Robot Navigation
Abstract. We present a purely vision-based scheme for learning a topological representation of an open environment. The system represents selected places by local views of the surr...
Matthias O. Franz, Bernhard Schölkopf, Philip...
ACSAC
2000
IEEE
15 years 7 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
96
Voted
PET
2009
Springer
15 years 10 months ago
APOD: Anonymous Physical Object Delivery
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website kn...
Elli Androulaki, Steven M. Bellovin