Sciweavers

19 search results - page 1 / 4
» Threat Analysis and Attacks on XtreemOS: a Grid-enabled Oper...
Sort
View
COREGRID
2007
Springer
13 years 10 months ago
Threat Analysis and Attacks on XtreemOS: a Grid-enabled Operating System
Amit D. Lakhani, Erica Y. Yang, Brian Matthews, Ia...
IFIP
2007
Springer
13 years 10 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
VOTEID
2007
Springer
13 years 10 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
EUC
2008
Springer
13 years 6 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
ACSAC
2009
IEEE
13 years 11 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...