Sciweavers

981 search results - page 125 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
TCS
2008
15 years 1 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
ESORICS
2008
Springer
15 years 3 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
FLAIRS
2006
15 years 2 months ago
Predicting Learners' Emotional Response in Intelligent Distance Learning Systems
Different research studies have proved that emotions meet a pivotal role in cognitive processes and in particular the studies made by Damasio who argues that human-beings without ...
Soumaya Chaffar, Claude Frasson
ICSE
2007
IEEE-ACM
16 years 1 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
CODASPY
2012
13 years 9 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...