Sciweavers

128
Voted
CCS
2006
ACM
15 years 7 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
DSD
2004
IEEE
100views Hardware» more  DSD 2004»
15 years 7 months ago
Reliability and Power Management of Integrated Systems
Kresimir Mihic, Tajana Simunic, Giovanni De Michel...
134
Voted
CCS
2006
ACM
15 years 7 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
125
Voted
CCS
2006
ACM
15 years 7 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
115
Voted
CCS
2006
ACM
15 years 7 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...