منابع مشابه
Information Security as a Resource
The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford’s Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of exactly how the security (of cryptographic protocols, coin-tossing schemes and similar) can and should be modelled as a resource (akin ...
متن کاملResource and Information Flow Security Requirements
ion from any particular JVM implementation. This implementation of JML’s heap space support in ESC/Java2 has uncovered interesting problems concerning the interaction between the ”\working space” specification function and the machine state in which it is evaluated. Compilation from JML to a specification language for bytecode has been carried out at INRIA Sophia in the context of using program...
متن کاملWordNet as a Geographical Information Resource
Geographical entities often appears in very different forms in text collections, such as when a foreign name is used instead of the English one, or when the citation of some region or place omits the name of a larger geographical entity containing them. This is a known problem in the field of Information Retrieval. The use of an ontology like WordNet can help in addressing this issue. In this p...
متن کاملInformation Disclosure as a Means to Security
In this paper we present a novel Stackelberg-type model of security domains: Security Assets aSsignment with Information disclosure (SASI). The model combines both the features of the Stackelberg Security Games (SSGs) model and of the Bayesian Persuasion (BP) model. More specifically, SASI includes: a) an uncontrolled, exogenous security state that serves as the Defender’s private information; ...
متن کاملInformation Security as a Credence Good
With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients’ vulnerabilitie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information and Computation
سال: 2013
ISSN: 0890-5401
DOI: 10.1016/j.ic.2013.03.001