Sciweavers

6907 search results - page 201 / 1382
» Securing distributed adaptation
Sort
View
ISSE
2006
15 years 3 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
IJISEC
2008
188views more  IJISEC 2008»
15 years 1 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
PODC
2010
ACM
15 years 7 months ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer
106
Voted
IPPS
2007
IEEE
15 years 9 months ago
A Global Security Architecture for Intrusion Detection on Computer Networks
— Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortu...
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bido...
FSTTCS
2004
Springer
15 years 8 months ago
Adaptive Stabilization of Reactive Protocols
A self-stabilizing distributed protocol can recover from any state-corrupting fault. A self-stabilizing protocol is called adaptive if its recovery time is proportional to the numb...
Shay Kutten, Boaz Patt-Shamir