Results 31 to 40 of about 446,967 (129)

Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]

open access: yes, 2012
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core   +1 more source

Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies

open access: yesJournal of Medical Internet Research, 2012
BackgroundSeveral obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Carrión Señor, Inmaculada   +2 more
doaj   +1 more source

Reliability

open access: yes, 2006
This special volume of Statistical Sciences presents some innovative, if not provocative, ideas in the area of reliability, or perhaps more appropriately named, integrated system assessment.
Anderson-Cook, Christine   +2 more
core   +1 more source

Soft Constraint Programming to Analysing Security Protocols

open access: yes, 2003
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength.
Bella, Giampaolo, Bistarelli, Stefano
core   +2 more sources

A Formal Model for Trust in Dynamic Networks [PDF]

open access: yes, 2003
We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation.
Carbone, M., Nielsen, M., Sassone, V.
core   +5 more sources

Security functions for a file repository [PDF]

open access: yes, 1996
When personal machines are incorporated into distributed\ud systems a new mixture of threats is exposed.\ud The security effort in the MobyDick project\ud is aimed at understanding how privacy can be protected\ud in this new environment.
Helme, Arne, Stabell-Kulo, Tage
core   +3 more sources

Deep Space Network information system architecture study [PDF]

open access: yes, 1992
The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s.
Atkinson, D. J.   +9 more
core   +1 more source

A Multi-Dimensional approach towards Intrusion Detection System

open access: yes, 2012
In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number of ...
Sanyal, Sugata   +1 more
core   +3 more sources

Extended requirements traceability: results of an industrial case study [PDF]

open access: yes, 1997
Contribution structures offer a way to model the network of people who have participated in the requirements engineering process. They further provide the opportunity to extend conventional forms of artifact-based requirements traceability with the ...
Finkelstein, A., Gotel, O.
core   +4 more sources

Spatiotemporal Patterns and Predictability of Cyberattacks [PDF]

open access: yes, 2015
Y.C.L. was supported by Air Force Office of Scientific Research (AFOSR) under grant no. FA9550-10-1-0083 and Army Research Office (ARO) under grant no. W911NF-14-1-0504. S.X. was supported by Army Research Office (ARO) under grant no.
Chen, Y Z   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy