Sciweavers

1795 search results - page 78 / 359
» Security Models and Information Flow
Sort
View
MICCAI
2010
Springer
14 years 10 months ago
Model-Based Multi-view Fusion of Cinematic Flow and Optical Imaging
Bioluminescence imaging (BLI) offers the possibility to study and image biology at molecular scale in small animals with applications in oncology or gene expression studies. Here ...
Mickael Savinaud, Martin de La Gorce, Serge Maitre...
CAISE
2011
Springer
14 years 3 months ago
Supporting Dynamic, People-Driven Processes through Self-learning of Message Flows
Abstract. Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Pr...
Christoph Dorn, Schahram Dustdar
TIT
2008
84views more  TIT 2008»
14 years 11 months ago
Information Theoretic Bounds on Authentication Systems in Query Model
Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability...
Reihaneh Safavi-Naini, Peter R. Wild
CCS
2006
ACM
15 years 3 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
ITCC
2005
IEEE
15 years 5 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset