Sciweavers

5722 search results - page 70 / 1145
» Security Function Interactions
Sort
View
118
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Secure Distributed Dossier Management in the Legal Domain
The use of digital dossiers in Courts of Law, although currently in the phase of study, will be common practice in the future. This paper introduces the notion of distributed digi...
Martijn Warnier, Frances M. T. Brazier, Martin Api...
96
Voted
CSFW
2006
IEEE
15 years 4 months ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
91
Voted
CRISIS
2009
15 years 2 months ago
Modeling dependencies in security risk management
This paper develops a framework for analyzing security risk dependencies in organizations and ranking the risks. The framework captures how risk `diffuses' via complex interac...
Tansu Alpcan, Nicholas Bambos
86
Voted
ACISP
1999
Springer
15 years 5 months ago
On the Symmetric Property of Homogeneous Boolean Functions
We use combinatorial methods and permutation groups to classify homogeneous boolean functions. The property of symmetry of a boolean function limits the size of the function’s cl...
Chengxin Qu, Jennifer Seberry, Josef Pieprzyk
114
Voted
CEC
2010
IEEE
15 years 1 months ago
Cooperative Co-evolution with delta grouping for large scale non-separable function optimization
— Many evolutionary algorithms have been proposed for large scale optimization. Parameter interaction in nonseparable problems is a major source of performance loss specially on ...
Mohammad Nabi Omidvar, Xiaodong Li, Xin Yao