Sciweavers

1597 search results - page 79 / 320
» Mental Models of Computer Security
Sort
View
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
15 years 3 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
123
Voted
CCS
2009
ACM
15 years 10 months ago
CoSP: a general framework for computational soundness proofs
We describe CoSP, a general framework for conducting computational soundness proofs of symbolic models and for embedding these proofs into formal calculi. CoSP considers arbitrary...
Michael Backes, Dennis Hofheinz, Dominique Unruh
158
Voted
GI
2003
Springer
15 years 9 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
GI
2001
Springer
15 years 8 months ago
Designing QoS and Charging Mechanisms: He who pays the service shapes the design
To accommodate applications with highly variable degrees and categories of Quality of Service (QoS) requirements, a major effort has been invested to overcome the traditional best-...
Anna Bouch, Martina Angela Sasse