Sciweavers

64 search results - page 3 / 13
» Simulation Verification and Validation by Dynamic Policy Enf...
Sort
View
107
Voted
ESORICS
2009
Springer
16 years 6 days ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...
ICSE
2008
IEEE-ACM
15 years 11 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
WSC
2001
15 years 1 months ago
Enabling smooth and scalable dynamic 3D visualization of discrete-event construction simulations
Visualizing simulated construction operations is an effective means of communicating the logic and the inner working of simulation models in a comprehensive and comprehendible man...
Vineet R. Kamat, Julio C. Martínez
102
Voted
CCR
2008
84views more  CCR 2008»
14 years 11 months ago
Modeling internet topology dynamics
Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. Whi...
Hamed Haddadi, Steve Uhlig, Andrew W. Moore, Richa...
JHSN
2006
95views more  JHSN 2006»
14 years 11 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...