Sciweavers

1587 search results - page 185 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
66
Voted
IPCCC
2006
IEEE
15 years 4 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
CCS
2009
ACM
15 years 5 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
PET
2004
Springer
15 years 3 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
100
Voted
HOTNETS
2010
14 years 5 months ago
The home needs an operating system (and an app store)
Abstract-- We argue that heterogeneity is hindering technological innovation in the home--homes differ in terms of their devices and how those devices are connected and used. To ab...
Colin Dixon, Ratul Mahajan, Sharad Agarwal, A. J. ...
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 1 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...