Sciweavers

1564 search results - page 98 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
70
Voted
ESORICS
2010
Springer
14 years 11 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
EOR
2007
104views more  EOR 2007»
14 years 9 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
TWC
2008
186views more  TWC 2008»
14 years 9 months ago
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
Abstract--The future metropolitan-area wireless mesh networks (WMNs) are expected to contain compromise-prone Mesh Access Points (MAPs) with a high frequency of inter-domain roamin...
Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho,...
ERSA
2009
109views Hardware» more  ERSA 2009»
14 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
CCS
2010
ACM
15 years 4 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang