Sciweavers

1154 search results - page 79 / 231
» Making Self-organizing Systems Secure
Sort
View
IFIP
2007
Springer
15 years 7 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
FC
2005
Springer
88views Cryptology» more  FC 2005»
15 years 7 months ago
Small Coalitions Cannot Manipulate Voting
We demonstrate how to make voting protocols resistant against manipulation by computationally bounded malicious voters, by extending the previous results of Conitzer and Sandholm i...
Edith Elkind, Helger Lipmaa
ERSHOV
2006
Springer
15 years 5 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska
JNCA
2006
86views more  JNCA 2006»
15 years 1 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
AGENTS
1998
Springer
15 years 5 months ago
Pitfalls of Agent-Oriented Development
While the theoretical and experimental foundations of agent-based systems are becoming increasingly well understood, comparatively little effort has been devoted to understanding ...
Michael Wooldridge, Nicholas R. Jennings