Sciweavers

2043 search results - page 115 / 409
» Reasoning About Security Models
Sort
View
136
Voted
CCS
2008
ACM
15 years 2 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
ICAIL
2007
ACM
15 years 4 months ago
Variants of temporal defeasible logics for modelling norm modifications
This paper proposes some variants of Temporal Defeasible Logic (TDL) to reason about normative modifications. These variants make it possible to differentiate cases in which, for ...
Guido Governatori, Antonino Rotolo, Régis R...
112
Voted
ISMIS
2005
Springer
15 years 6 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
112
Voted
ICCS
2001
Springer
15 years 5 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
101
Voted
AI
2001
Springer
15 years 5 months ago
How AI Can Help SE; or: Randomized Search Not Considered Harmful
In fast-paced software projects, engineers don’t have the time or the resources to build heavyweight complete descriptions of their software. The best they can do is lightweight ...
Tim Menzies, Harshinder Singh