Sciweavers

4330 search results - page 94 / 866
» Analyzing security architectures
Sort
View
123
Voted
CIS
2006
Springer
15 years 8 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
ISSE
2006
15 years 4 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
133
Voted
ACISP
1998
Springer
15 years 9 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
IEEEARES
2009
IEEE
15 years 2 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark