Sciweavers

580 search results - page 87 / 116
» Expressive policy analysis with enhanced system dynamicity
Sort
View
JCSS
2008
159views more  JCSS 2008»
14 years 9 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 2 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
CIKM
2005
Springer
15 years 3 months ago
Structured queries in XML retrieval
Document-centric XML is a mixture of text and structure. With the increased availability of document-centric XML content comes a need for query facilities in which both structural...
Jaap Kamps, Maarten Marx, Maarten de Rijke, Bö...
SMC
2007
IEEE
105views Control Systems» more  SMC 2007»
15 years 4 months ago
Performance evaluation of petri nets execution algorithms
— In this paper we present a performance evaluation of interpreted and centralized implementation techniques of Petri nets. These implementation techniques allow the translation ...
Ramon Piedrafita Moreno, José Luis Villarro...
ACSAC
2001
IEEE
15 years 1 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner