Sciweavers

2043 search results - page 141 / 409
» Reasoning About Security Models
Sort
View
113
Voted
CCS
2007
ACM
15 years 7 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
99
Voted
CSFW
2003
IEEE
15 years 6 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
127
Voted
ICDM
2010
IEEE
160views Data Mining» more  ICDM 2010»
14 years 10 months ago
A Privacy Preserving Framework for Gaussian Mixture Models
Abstract--This paper presents a framework for privacypreserving Gaussian Mixture Model computations. Specifically, we consider a scenario where a central service wants to learn the...
Madhusudana Shashanka
94
Voted
ENTCS
2007
109views more  ENTCS 2007»
15 years 22 days ago
Symbolic Model Checking for Channel-based Component Connectors
The paper reports on the foundations and experimental results with a model checker for component connectors modelled by networks of channels in the calculus Reo. The specificatio...
Sascha Klüppelholz, Christel Baier
74
Voted
CEEMAS
2005
Springer
15 years 6 months ago
An Operational Model for Mutual Awareness
Typical interaction models as addressed messages present several pitfalls. To overcome these limits, new interactional models close to the concept of mutual awareness have been pro...
Flavien Balbo, Julien Saunier, Suzanne Pinson, Mah...