Sciweavers

TDSC
2008
152views more  TDSC 2008»
13 years 4 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
TDSC
2008
119views more  TDSC 2008»
13 years 4 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...
TDSC
2008
121views more  TDSC 2008»
13 years 4 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
TDSC
2008
82views more  TDSC 2008»
13 years 4 months ago
Generalized Ring Signatures
Jian Ren, Lein Harn
TDSC
2008
99views more  TDSC 2008»
13 years 4 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
TDSC
2008
87views more  TDSC 2008»
13 years 4 months ago
Credit Card Fraud Detection Using Hidden Markov Model
Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for bo...
Abhinav Srivastava, Amlan Kundu, Shamik Sural, Aru...
TDSC
2008
102views more  TDSC 2008»
13 years 4 months ago
Temporal Partitioning of Communication Resources in an Integrated Architecture
Integrated architectures in the automotive and avionic domain promise improved resource utilization and enable a better coordination of application subsystems compared to federated...
Roman Obermaisser
TDSC
2008
83views more  TDSC 2008»
13 years 4 months ago
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of...
T. Y. Wong, Man Hon Wong, John C. S. Lui
TDSC
2008
116views more  TDSC 2008»
13 years 4 months ago
Practical Inference Control for Data Cubes
The fundamental problem for inference control in data cubes is how to efficiently calculate the lower and upper bounds for each cell value given the aggregations of cell values ove...
Haibing Lu, Yingjiu Li
TDSC
2008
125views more  TDSC 2008»
13 years 4 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar