Sciweavers

1597 search results - page 305 / 320
» Mental Models of Computer Security
Sort
View
CCR
2002
111views more  CCR 2002»
15 years 1 months ago
A taxonomy and design considerations for Internet accounting
Economic principles are increasingly being suggested for addressing some complex issues related to distributed resource allocation for QoS (Quality of Service) enhancement. Many p...
Michel Kouadio, Udo W. Pooch
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 1 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
113
Voted
FAC
2010
107views more  FAC 2010»
15 years 8 days ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
155
Voted
ITNG
2010
IEEE
15 years 5 days ago
Record Setting Software Implementation of DES Using CUDA
—The increase in computational power of off-the-shelf hardware offers more and more advantageous tradeoffs among efficiency, cost and availability, thus enhancing the feasibil...
Giovanni Agosta, Alessandro Barenghi, Fabrizio De ...
SEKE
2010
Springer
15 years 3 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li