Sciweavers

518 search results - page 38 / 104
» Abstract Interpretation-Based Protection
Sort
View
ASIASIM
2004
Springer
15 years 7 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
TRUSTBUS
2004
Springer
15 years 7 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
GCC
2003
Springer
15 years 7 months ago
On the Malicious Participants Problem in Computational Grid
Abstract. Computational Grid allows customers to submit tasks to service providers. To maintain the availability, fairness and performance, it is critical to protect Computational ...
Wenguang Chen, Weimin Zheng, Guangwen Yang
EMSOFT
2001
Springer
15 years 6 months ago
Bus Architectures for Safety-Critical Embedded Systems
Abstract. Embedded systems for safety-critical applications often integrate multiple “functions” and must generally be fault-tolerant. These requirements lead to a need for mec...
John M. Rushby
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
15 years 6 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer