Sciweavers

2043 search results - page 167 / 409
» Reasoning About Security Models
Sort
View
HCW
1998
IEEE
15 years 5 months ago
Steps Toward Understanding Performance in Java
Java's design goals of portability, safety, and ubiquity make it a potentially ideal language for large-scale heterogeneous computing. One of the remaining challenges is to c...
Doug Lea
IJCAI
2003
15 years 2 months ago
The Traits of the Personable
Information personalization is fertile ground for application of AI techniques. In this article I relate personalization to the ability to capture partial information in an informa...
Naren Ramakrishnan
ER
2007
Springer
105views Database» more  ER 2007»
15 years 7 months ago
Clarifying Goal Models
Representation and reasoning about information system (IS) requirements is facilitated with the use of goal models to describe the desired and undesired IS behaviors. One difficul...
Ivan Jureta, Stéphane Faulkner
CSREASAM
2006
15 years 2 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ASIACRYPT
2006
Springer
15 years 4 months ago
Relationship Between Standard Model Plaintext Awareness and Message Hiding
Abstract. Recently, Bellare and Palacio succeeded in defining the plaintext awareness, which is also called PA2, in the standard model. They propose three valiants of the standard ...
Isamu Teranishi, Wakaha Ogata