Sciweavers

CCS
2006
ACM
15 years 19 days ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
ACSW
2006
14 years 10 months ago
An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing
The conventional computing Grid has developed a service oriented computing architecture with a superlocal resource management and scheduling strategy. This architecture is limited...
Jia Tang, Minjie Zhang
ACSAC
2006
IEEE
15 years 19 days ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
CSREASAM
2006
14 years 10 months ago
A Survey of Unimodal Biometric Methods
Apart from making the authentication system reliable, biometric systems reduce the time required for authentication considerably at the airports, borders, and government offices. ...
Shahram Latifi, Nimalan Solayappan
Security Privacy
Top of PageReset Settings