Sciweavers

171 search results - page 21 / 35
» Improving Computer Security Using Extended Static Checking
Sort
View
BIRTHDAY
2011
Springer
13 years 9 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
SACMAT
2003
ACM
15 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
89
Voted
TDSC
2008
125views more  TDSC 2008»
14 years 9 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
ICCS
2004
Springer
15 years 2 months ago
Simulation Coercion Applied to Multiagent DDDAS
Abstract. The unpredictable run-time configurations of dynamic, datadriven application systems require flexible simulation components that can adapt to changes in the number of i...
Yannick Loitière, David C. Brogan, Paul F. ...
FC
2005
Springer
88views Cryptology» more  FC 2005»
15 years 3 months ago
Small Coalitions Cannot Manipulate Voting
We demonstrate how to make voting protocols resistant against manipulation by computationally bounded malicious voters, by extending the previous results of Conitzer and Sandholm i...
Edith Elkind, Helger Lipmaa