Sciweavers

575 search results - page 43 / 115
» A model for evaluating IT security investments
Sort
View
ATAL
2009
Springer
15 years 8 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
TR
2008
98views more  TR 2008»
15 years 1 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
16 years 2 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
ESSOS
2011
Springer
14 years 5 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
PERCOM
2011
ACM
14 years 9 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...