Sciweavers

762 search results - page 3 / 153
» Modeling and Simulating Information Security Management
Sort
View
WSC
1998
13 years 6 months ago
Discrete Event Simulation Experiments and Geographic Information Systems in Congestion Management Planning
A regional transportation system and the movement of large traffic volumes through it, are characteristic of stochastic systems. The standard traffic management or transportation ...
Roy Brooks Wiley, Thomas K. Keyser
DAC
2005
ACM
14 years 5 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
WORM
2003
13 years 6 months ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
13 years 10 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
EUROSYS
2008
ACM
14 years 1 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler