Sciweavers

1875 search results - page 26 / 375
» Modeling the Security of Steganographic Systems
Sort
View
100
Voted
ATAL
2010
Springer
15 years 1 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
84
Voted
ICSE
2007
IEEE-ACM
16 years 23 days ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 6 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
137
Voted
IEEESCC
2010
IEEE
15 years 2 months ago
SecureSOA
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide...
Michael Menzel, Christoph Meinel
EUROCRYPT
2006
Springer
15 years 4 months ago
Language Modeling and Encryption on Packet Switched Networks
The holy grail of a mathematical model of secure encryption is to devise a model that is both faithful in its description of the real world, and yet admits a construction for an en...
Kevin S. McCurley