Sciweavers

2979 search results - page 374 / 596
» Modelling secure multiagent systems
Sort
View
DSOM
2007
Springer
15 years 10 months ago
Botnets for Scalable Management
With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets ...
Jérôme François, Radu State, O...
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 8 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
ETRICS
2006
15 years 8 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
COMPSAC
2005
IEEE
15 years 10 months ago
Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development
Model driven development (MDD) tackles software complexity through the use of models. However, managing relationships and specifying transformations models at various levels of ab...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Sud...
OOPSLA
2007
Springer
15 years 10 months ago
SmartEMF: guidance in modeling tools
The advent of domain-specific modeling in enterprise systems development has given rise to new tool requirements. Existing tools do not offer sufficient modeling guidance or inc...
Anders Hessellund