Sciweavers

4330 search results - page 129 / 866
» Analyzing security architectures
Sort
View
137
Voted
IWPC
2002
IEEE
15 years 10 months ago
Architecture Recovery of Dynamically Linked Applications: A Case Study
Most previously published case studies in architecture recovery have been performed on statically linked software systems. Due to the increase in use of middleware technologies, s...
Igor Ivkovic, Michael W. Godfrey
IJNSEC
2006
81views more  IJNSEC 2006»
15 years 5 months ago
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failu...
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
KES
2005
Springer
15 years 10 months ago
A Network Service Access Control Framework Based on Network Blocking Algorithm
Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Jahwan Koo, Seong-Jin Ahn
CIDR
2007
113views Algorithms» more  CIDR 2007»
15 years 6 months ago
Securing history: Privacy and accountability in database systems
Databases that preserve a historical record of activities and data offer the important benefit of system accountability: past events can be analyzed to detect breaches and maint...
Gerome Miklau, Brian Neil Levine, Patrick Stahlber...
147
Voted
ESORICS
2003
Springer
15 years 10 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...