نتایج جستجو برای: security order

تعداد نتایج: 1066303  

2005
Ayse Morali Erich Ortner Carlos Varela

Online computations are getting more and more embedded into the daily life of people, in particular, they have practical applications in electronic commerce. In the cyber world, mobile codes interact with each other and their environment on behalf of sellers and buyers of the real world. Mobile code technologies provide potential benefits to applications, but as the responsibilities and the com...

1993
Pierre Bieber Nora Cuppens-Boulahia T. Lehmann E. van Wickeren

We use an existing formal software developement method called B in order to build and verify specica-tions of a communication channel, cryptographic functions and security properties. We show on an example how these basic specications may be combined in order to write abstract specications of cryptographic protocols and to verify their security. 1 Introduction Security evaluation criteria recom...

Journal: :J. Information Security 2011
Tao Xu Chunxiao Yi

With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web service security. In order to solve the security issue of heterogeneous platforms, a security processing model named SIMSA (Security Interactive Model based on SOAP and Authenticatio...

Journal: :Future Generation Comp. Syst. 2013
Raheel Hassan Syed Maxime Syrame Julien Bourgeois

In single administrative domain networks there is only one security policy which can be evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid networks are often composed of different administrative domains owned by different organizations dispersed globally. Such networks are referred to asmulti-administrative domain networks. Each domainmight have its own securit...

1996
Elizabeth Shriver

An attribute-managed solver makes assignments of workload units to devices based on attributes specifications that describe the workload units and the devices. This paper presents the sets of attributes that model workloads and devices. It also discusses the necessary formalization of an attribute-managed solver in terms of objective functions and constraint expressions. These formalizations en...

2002
Michael Clifford

The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the message itself can be computed. The model works even if there is no prior relationship between the sender and receiver of the message. The Solar Trust Model overcomes a variety of limitations inherent in the design of other ...

2008
A. KELIĆ M. V. RICCIARDI K.-H. SCHMIDT

The physics and the technical algorithms of the statistical de-excitation code ABLA07 are documented. The new developments of ABLA07 have been guided by the empirical knowledge obtained in a recent experimental campaign on the nuclide distributions measured at GSI, Darmstadt. Besides distinct signatures of very asymmetric binary splits, lighter systems show clear features of multifragmentation,...

2001
Erich Kirchler Boris Maciejovsky Friedrich Schneider

From an economic point of view, legal considerations apart, tax avoidance, tax evasion and tax flight have similar effects, namely a reduction of revenue yields, and are based on the same desire to reduce the tax burden. Due to legal differences and moral concerns it is, however, likely that individuals perceive them as different and as unequally fair. Overall, 252 fiscal officers, business stu...

Journal: :Int. J. Intell. Syst. 2004
Salem Benferhat Rania El Baida

Modeling information security policies is an important problem in many domains. This is particularly true in the health care sector where information systems often manage sensitive and critical data. This paper proposes to use non-monotonic reasoning systems to control access to sensitive data in accordance with a security policy. In the first part of the paper, we propose an access control mod...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید