Sciweavers

3811 search results - page 30 / 763
» The Safe-Tcl Security Model
Sort
View
ISI
2003
Springer
15 years 5 months ago
Locating Hidden Groups in Communication Networks Using Hidden Markov Models
Malik Magdon-Ismail, Mark K. Goldberg, William A. ...
CHI
2008
ACM
16 years 7 days ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
SAC
2004
ACM
15 years 5 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
IEEEARES
2006
IEEE
15 years 5 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
15 years 4 months ago
Oblivious Transfer in the Bounded Storage Model
Building on a previous important work of Cachin, Cr´epeau, and Marcil [15], we present a provably secure and more efficient protocol for 2 1 -Oblivious Transfer with a storage-bou...
Yan Zong Ding