Sciweavers

2043 search results - page 141 / 409
» Reasoning About Security Models
Sort
View
CCS
2007
ACM
15 years 11 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CSFW
2003
IEEE
15 years 10 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
ICDM
2010
IEEE
160views Data Mining» more  ICDM 2010»
15 years 3 months ago
A Privacy Preserving Framework for Gaussian Mixture Models
Abstract--This paper presents a framework for privacypreserving Gaussian Mixture Model computations. Specifically, we consider a scenario where a central service wants to learn the...
Madhusudana Shashanka
ENTCS
2007
109views more  ENTCS 2007»
15 years 5 months ago
Symbolic Model Checking for Channel-based Component Connectors
The paper reports on the foundations and experimental results with a model checker for component connectors modelled by networks of channels in the calculus Reo. The specificatio...
Sascha Klüppelholz, Christel Baier
CEEMAS
2005
Springer
15 years 10 months ago
An Operational Model for Mutual Awareness
Typical interaction models as addressed messages present several pitfalls. To overcome these limits, new interactional models close to the concept of mutual awareness have been pro...
Flavien Balbo, Julien Saunier, Suzanne Pinson, Mah...