Filters








131,823 Hits in 5.8 sec

A Quantitative Approach to Reductions in Secure Computation [chapter]

Amos Beimel, Tal Malkin
2004 Lecture Notes in Computer Science  
In this paper, we take a quantitative approach, associating with each function f the minimal number of calls to the black box that are required for securely computing f .  ...  This approach leads to a better understanding of the inherent complexity for securely computing a given function f .  ...  We are also grateful to AT&T Labs-Research that hosted us for two weeks and for three years, respectively, during which part of this research was conducted.  ... 
doi:10.1007/978-3-540-24638-1_14 fatcat:khnh525o6vhrzfyg5nkceqg4fe

Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method

Ming- Chang Lee
2014 International Journal of Computer Science & Information Technology (IJCSIT)  
A Practical advice for evaluation information security risk is discussed. This approach is combination with AHP and Fuzzy comprehensive method.  ...  However, hierarchy process has been widely used in security assessment.  ...  ACKNOWLEDGEMENTS I would like to thank the anonymous reviewers for their constructive comments on this paper.  ... 
doi:10.5121/ijcsit.2014.6103 fatcat:urdidor4ujhktepmiru5vdmseq

Evolutionary Computing Environments: Implementing Security Risks Management and Benchmarking

Vinita Malik, Sukhdip Singh
2020 Procedia Computer Science  
The contribution of paper lies in identifying, managing risks in advanced computing paradigms, mitigating security risks and benchmarking smart softwares.  ...  The contribution of paper lies in identifying, managing risks in advanced computing paradigms, mitigating security risks and benchmarking smart softwares.  ...  The paper has also focussed on how to reduce various security risks of a big data application by smart software.  ... 
doi:10.1016/j.procs.2020.03.430 fatcat:ru4stjnmnnaypcbrhme6qniyyi

ICT Security Risk Management: Economic Perspectives

Gebhard Geiger
2014 Position Papers of the 2014 Federated Conference on Computer Science and Information Systems  
approaches to measure the effectiveness and cost-efficiency of the ICT security management.  ...  From the economic perspective, this situation requires various basic research approaches to be taken to increase ICT security.  ...  As the example demonstrates, however, this discrepancy can at least be understood very much in detail in systematic, quantitative ways, using a suitable, quantitative approach to ICT security economics  ... 
doi:10.15439/2014f439 dblp:conf/fedcsis/Geiger14 fatcat:6zbxyjq6hbeaxmp7l5ztrcu2nu

An experimental survey of metal artefact reduction in computed tomography

Andre Mouton, Najla Megherbi, Katrien Van Slambrouck, Johan Nuyts, Toby P Breckon
2013 Journal of X-Ray Science and Technology  
We present a survey of techniques for the reduction of streaking artefacts caused by metallic objects in X-ray Computed Tomography (CT) images.  ...  We address the shortage of thorough performance analyses in the existing MAR literature by conducting a qualitative as well as quantitative comparative evaluation of the selected techniques.  ...  Acknowledgements This project was funded under the Innovative Research Call in Explosives and Weapons Detection (2010) initiative, a cross-  ... 
doi:10.3233/xst-130372 pmid:23694911 fatcat:gh52xi53kjehxlgi4h4wfysvwq

Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures [chapter]

Francesco Flammini, Andrea Gaglione, Nicola Mazzocca, Concetta Pragliola
2009 Lecture Notes in Computer Science  
This paper presents a quantitative method and a tool for the security risk assessment and management specifically tailored to the context of railway transportation systems, which are exposed to threats  ...  Scientists have been long investigating procedures, models and tools for the risk analysis in several domains, from economics to computer networks.  ...  While it does not seem to exist a generally accepted taxonomy, this is the meaning we will give to such terms in this paper. This paper concentrates on quantitative risk analysis approaches.  ... 
doi:10.1007/978-3-642-03552-4_16 fatcat:bdw36hjbvncgjdc6vm7ix3xjtu

Capturing the Essence of Practical Obfuscation [chapter]

J. Todd McDonald
2012 Communications in Computer and Information Science  
The essence of obfuscation (in practice) is best described as a measurable loss of abstraction.  ...  As a field of study, obfuscation would benefit from a unifying framework that has solid theoretical foundation yet provides value in empirical study and implementation.  ...  Defining security properties of interest and developing variation algorithms that obscure those properties in a quantitative approach would serve to validate practical techniques.  ... 
doi:10.1007/978-3-642-29166-1_44 fatcat:rqezlqbfynfi7dyidzormarol4

Secure Distribution of Factor Analysis of Mixed Data (FAMD) and Its Application to Personalized Medicine of Transplanted Patients

Sirine Sayadi, Estelle Geffard, Mario Südholt, Nicolas Vince, Pierre-Antoine Gourraud
2021 International Conference on Advanced Information Networking and Applications  
We present a new distribution method for FAMD and evaluate its implementation in a multi-site setting based on real data.  ...  While such analyses are well-known in the medical domain, they have to satisfy new data governance constraints if reference data is distributed, notably in the context of large consortia developing the  ...  In a second step we perform dimension reduction by means of a distributed PCA in order to obtain a secure and distributed FAMD algorithm.  ... 
doi:10.1007/978-3-030-75100-5_44 dblp:conf/aina/SayadiGSVG21 fatcat:ccci3n5xpva73cdmg55kwgcwya

Quantitative Aspects of Programming Languages and Systems over the past 2^4 years and beyond

Alessandro Aldini
2020 Electronic Proceedings in Theoretical Computer Science  
Quantitative aspects of computation are related to the use of both physical and mathematical quantities, including time, performance metrics, probability, and measures for reliability and security.  ...  Along the last two decades a variety of theoretical achievements and automated techniques have contributed to make quantitative modeling and verification mainstream in the research community.  ...  Entropy-based approaches are commonly used also in the setting of security protocol verification, when moving from the classical symbolic approach of the Dolev-Yao model to the computational model of security  ... 
doi:10.4204/eptcs.312.1 fatcat:4fjvygbppjbq3k5ury2kvue3nq

A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing

Ahmad Amini, Norziana Jamil
2018 Journal of Physics, Conference Series  
Cloud computing is a popular paradigm in information technology and computing as it offers numerous advantages in terms of economical saving and minimal management effort.  ...  Therefore, the vulnerabilities and threats in cloud computing have to be identified and proper risk assessment mechanism has to be in place for better cloud computing management.  ...  This study is partly funded by TNB Seed Fund 2016 under a project 'R&D of Micro Cryptographic Engine for Protecting Data in SCADA Link'.  ... 
doi:10.1088/1742-6596/1018/1/012004 fatcat:z4mjvwuzdnc6zglmjd4azaiw5q

Cloud Computing Adoption by Business Organization: A Systematic Review

2017 Australian Journal of Basic and Applied Sciences  
In addition, the paper aims to provide a clear understanding about the current situation of the research in the cloud computing technology.  ...  Cloud computing is a new technology that can provide benefits to all stakeholders. Most of the studies attempted to find the factors that affect the adoption of this technology.  ...  Research Methodology: This study is a quantitative in nature. It reviews the existing literature to identify the factors that affect the cloud computing adoption.  ... 
doi:10.22587/ajbas.2017.11.13.3 fatcat:bz4bsrakmnh4hl4gaecjyys3ru

A distance driven method for metal artefact reduction in computed tomography

Andre Mouton, Najla Megherbi, Katrien Van Slambrouck, Johan Nuyts, Toby P. Breckon
2013 2013 IEEE International Conference on Image Processing  
This paper presents an extension to a recent intensity-limiting sinogram completion-based Metal Artefact Reduction (MAR) algorithm for Computed Tomography (CT) images containing multiple metal objects.  ...  Extensive experimentation is performed on a state-of-the-art numerical simulation, a clinical CT data set and a baggage security CT data set.  ...  We recently proposed a novel, yet efficient, interpolation-based MAR approach for the reduction of metal artefacts in CT baggage security imagery [16] .  ... 
doi:10.1109/icip.2013.6738481 dblp:conf/icip/MoutonMSNB13 fatcat:4s6xldvi35exna5vih5xjoutgm

Formal and Intelligent Methods for Security and Resilience: Education and Training Issues

Oksana Pomorova, Sergii Lysenko
2016 Information & Security: An International Journal  
The module deals with the issues of development and usage of formal methods for designing secure software systems and implementation of formal methods for assuring security of computer networks.  ...  The main challenge was to develop curriculum and course materials for masters and PhD students.  ...  in building secure computer systems and software in a provable way.  ... 
doi:10.11610/isij.3507 fatcat:d24m3sfaxveqbjqakjeknkvxyi

Dimensional reduction analysis for Physical Layer device fingerprints with application to ZigBee and Z-Wave devices

Trevor J. Bihl, Kenneth W. Bauer, Michael A. Temple, Benjamin Ramsey
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
Test statistic approaches emerge as superior to p-value approaches and offer both higher resolution in selecting features and generally better device discrimination.  ...  Radio Frequency RF Distinct Native Attribute (RF-DNA) Fingerprinting is a PHY-based security method that enhances device identification (ID).  ...  Gain is defined here as the reduction in required SNR, expressed in dB, for two methods to achieve the same %C when compared to the full dimensional baseline.  ... 
doi:10.1109/milcom.2015.7357469 dblp:conf/milcom/BihlBTR15 fatcat:xrbczgvy5vgpfhrq5oeakywo2y

Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems

Mohamad El-Abed, Patrick Lacharme, Christophe Rosenberger
2012 2012 5th IAPR International Conference on Biometrics (ICB)  
First, it provides biometrics community an evaluation tool to assess biometric systems in term of security.  ...  A keystroke dynamics system is used to illustrate the benefits of the presented platform.  ...  Risk factor computation of the identified threats In order to compute the risk factors of the identified threats, we use a quantitative approach based on the multi-criteria analysis (MCA).  ... 
doi:10.1109/icb.2012.6199793 dblp:conf/icb/El-AbedLR12 fatcat:bky5sswchfe53j3wfcveonhm4u
« Previous Showing results 1 — 15 out of 131,823 results