Sciweavers

575 search results - page 7 / 115
» A model for evaluating IT security investments
Sort
View
CRISIS
2008
14 years 11 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita
68
Voted
CSFW
1999
IEEE
15 years 1 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
72
Voted
FC
2009
Springer
135views Cryptology» more  FC 2009»
15 years 4 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
EUROCRYPT
2006
Springer
15 years 1 months ago
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
The standard security definition of unconditional secure function evaluation, which is based on the ideal/real model paradigm, has the disadvantage of being overly complicated to w...
Claude Crépeau, George Savvides, Christian ...
CEC
2007
IEEE
15 years 3 months ago
ALPS evaluation in financial portfolio optimisation
— Hornby’s Age-Layered Population Structure claims to reduce premature convergence in Evolutionary Algorithms. We provide the first evaluation of ALPS on a realworld problem ...
Suneer Patel, Christopher D. Clack