Sciweavers

46 search results - page 2 / 10
» Intruder Theories (Ongoing Work)
Sort
View
COMCOM
2008
120views more  COMCOM 2008»
13 years 5 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
FOSAD
2009
Springer
14 years 3 days ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
CCS
2008
ACM
13 years 7 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
PDC
2004
ACM
13 years 11 months ago
Socio-technical walkthrough: designing technology along work processes
How can the documentation of concepts for complex sociotechnical systems, such as the adoption of groupware, be incorporated into practices of PD? Documents are important in suppo...
Thomas Herrmann, Gabriele Kunau, Kai-Uwe Loser, Na...
ICSE
2003
IEEE-ACM
14 years 5 months ago
Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories
This paper outlines an approach of using engineeringoriented design theories to build bridges between software engineering and human?computer interaction. The main thrust of the a...
Andrew Walenstein