Sciweavers

1373 search results - page 108 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
CASCON
2006
127views Education» more  CASCON 2006»
15 years 3 months ago
A model and architecture for situation determination
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current appro...
Graham Thomson, Sotirios Terzis, Paddy Nixon
JAIR
2011
214views more  JAIR 2011»
14 years 4 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
142
Voted
IFIPTCS
2010
14 years 11 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
CCS
2010
ACM
15 years 1 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
PERCOM
2004
ACM
16 years 1 months ago
Comprehensive Structured Context Profiles (CSCP): Design and Experiences
In dynamic heterogeneous environments, such as Pervasive Computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such...
Sven Buchholz, Thomas Hamann, Gerald Hübsch