This paper provides a general and comprehensive approach to implementing misuse detection on expert systems and an in-depth analysis of the effectiveness of the optimization strat...
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Deep Space One will be the rst spacecraft to be controlled by an autonomous agent potentially capable of carrying out a complete mission with minimal commandingfrom Earth. The New...
Nicola Muscettola, Paul H. Morris, Barney Pell, Be...
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...