Sciweavers

530 search results - page 20 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
DOCENG
2010
ACM
14 years 10 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
67
Voted
CCS
2007
ACM
15 years 3 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
73
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
APSEC
2006
IEEE
15 years 3 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan
IEEEARES
2007
IEEE
15 years 4 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa