Sciweavers

331 search results - page 39 / 67
» Software Protection Mechanisms for Dependable Systems
Sort
View
WORM
2003
14 years 11 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 4 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
83
Voted
ICSE
2007
IEEE-ACM
15 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
WIAS
2010
102views more  WIAS 2010»
14 years 8 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
ISSRE
2007
IEEE
14 years 11 months ago
Testing Security Policies: Going Beyond Functional Testing
While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper i...
Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry