Sciweavers

19 search results - page 3 / 4
» Multilevel Secure Rules and Its Impact on the Design of Acti...
Sort
View
AAAI
1998
13 years 7 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...
PADS
2009
ACM
14 years 1 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
POPL
2008
ACM
14 years 6 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
MDM
2005
Springer
127views Communications» more  MDM 2005»
13 years 11 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
ER
2007
Springer
137views Database» more  ER 2007»
14 years 13 days ago
Prioritized Preferences and Choice Constraints
It is increasingly recognised that user preferences should be addressed in many advanced database applications, such as adaptive searching in databases. However, the fundamental is...
Wilfred Ng