Sciweavers

2043 search results - page 155 / 409
» Reasoning About Security Models
Sort
View
CLIMA
2010
15 years 2 months ago
Combining Logics in Simple Type Theory
Simple type theory is suited as framework for combining classical and non-classical logics. This claim is based on the observation that various prominent logics, including (quantif...
Christoph Benzmüller
83
Voted
EPART
2011
103views more  EPART 2011»
14 years 17 days ago
Towards a Structured Online Consultation Tool
Abstract. The Structured Online Consultation tool (SCT) is a component tool in the IMPACT Project which is used to construct and present detailed surveys that solicit feedback from...
Adam Zachary Wyner, Katie Atkinson, Trevor J. M. B...
104
Voted
IJNSEC
2007
96views more  IJNSEC 2007»
15 years 22 days ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
139
Voted
TES
2001
Springer
15 years 5 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
125
Voted
CCS
2009
ACM
15 years 7 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache