Sciweavers

3811 search results - page 64 / 763
» The Safe-Tcl Security Model
Sort
View
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
14 years 10 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
SIN
2009
ACM
15 years 6 months ago
An information security ontology incorporating human-behavioural implications
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation’s information security management procedures. To...
Simon Edward Parkin, Aad P. A. van Moorsel, Robert...
OOPSLA
2009
Springer
15 years 6 months ago
Supporting model evolution through demonstration-based model transformation
Model evolution is often supported by writing model transformation rules in specialized languages. This presents challenges to those who are unfamiliar with model transformation l...
Yu Sun
MM
2004
ACM
106views Multimedia» more  MM 2004»
15 years 5 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
ESORICS
2004
Springer
15 years 5 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes