Sciweavers

154 search results - page 5 / 31
» Security architecture testing using IDS - a case study
Sort
View
FAC
2007
128views more  FAC 2007»
14 years 9 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
SIGUCCS
2005
ACM
15 years 3 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
IDEAL
2005
Springer
15 years 3 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
COMPSAC
2005
IEEE
15 years 3 months ago
Adaptive Testing, Oracle Generation, and Test Case Ranking for Web Services
Web services and service-oriented architecture are emerging technologies that are changing the way we develop and use computer software. Due to the standardization of web services...
Wei-Tek Tsai, Yinong Chen, Raymond A. Paul, Hai Hu...
EUROSYS
2006
ACM
15 years 6 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...