Sciweavers

3003 search results - page 417 / 601
» Software Security: Building Security In
Sort
View
MKWI
2008
168views Business» more  MKWI 2008»
15 years 6 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
SBACPAD
2004
IEEE
93views Hardware» more  SBACPAD 2004»
15 years 6 months ago
FlowCert : Probabilistic Certification for Peer-to-Peer Computations
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of nodes for computing parallel applications. At this scale, it raises the problem o...
Sébastien Varrette, Jean-Louis Roch, Franck...
139
Voted
TASE
2008
IEEE
15 years 4 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
AC
2004
Springer
15 years 4 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz