Sciweavers

2979 search results - page 530 / 596
» Modelling secure multiagent systems
Sort
View
ISI
2004
Springer
15 years 5 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
PET
2004
Springer
15 years 5 months ago
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...
ACSAC
2003
IEEE
15 years 5 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
AGENTS
2001
Springer
15 years 4 months ago
Social role awareness in animated agents
This paper promotes social role awareness as a desirable capability of animated agents, that are by now strong affective reasoners, but otherwise often lack the social competence ...
Helmut Prendinger, Mitsuru Ishizuka
OOPSLA
2001
Springer
15 years 4 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder