Sciweavers

5475 search results - page 151 / 1095
» Model Driven Security
Sort
View
ACSAC
2000
IEEE
15 years 5 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
WS
2006
ACM
15 years 6 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
103
Voted
CCS
2006
ACM
15 years 4 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
55
Voted
STOC
2002
ACM
97views Algorithms» more  STOC 2002»
16 years 1 months ago
Tight security proofs for the bounded-storage model
Stefan Dziembowski, Ueli M. Maurer
88
Voted
CRISIS
2009
15 years 1 months ago
Modeling dependencies in security risk management
This paper develops a framework for analyzing security risk dependencies in organizations and ranking the risks. The framework captures how risk `diffuses' via complex interac...
Tansu Alpcan, Nicholas Bambos