Sciweavers

2043 search results - page 149 / 409
» Reasoning About Security Models
Sort
View
128
Voted
FUIN
2006
160views more  FUIN 2006»
15 years 24 days ago
Behavioral Pattern Identification Through Rough Set Modeling
This paper introduces an approach to behavioral pattern identification as a part of a study of temporal patterns in complex dynamical systems. Rough set theory introduced by Zdzisl...
Jan G. Bazan
RE
2010
Springer
14 years 7 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
109
Voted
EUROCRYPT
1999
Springer
15 years 5 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
129
Voted
DLOG
2009
14 years 10 months ago
Model-Based Most Specific Concepts in Some Inexpressive Description Logics
Abstract. Model-based most specific concepts are a non-standard reasoning service in Description Logics. They have turned out to be useful in knowledge base completion for ontologi...
Felix Distel
IEEEARES
2006
IEEE
15 years 6 months ago
Offline Internet Banking Fraud Detection
Nowadays, most important topic about internet banking is security. Banks’ basic concern is ensuring their customers’ electronic transactions. Nevertheless, fraudsters are beco...
Vasilis Aggelis