Sciweavers

1028 search results - page 17 / 103
» Using Attack Graphs to Design Systems
Sort
View
196 views 97 votes 15 years 2 months ago  CAISE 2010»
For enterprises it has become crucial to check compliance of their business processes with certain rules such as medical guidelines or financial regulations. When automating compli...
224 views 126 votes 15 years 1 months ago  CN 2007»
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
92 views 105 votes 15 years 6 months ago  COMPSAC 2005»
Distributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensi...
168 views 121 votes 15 years 7 months ago  WOWMOM 2006»
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
144 views 90 votes 15 years 8 months ago  NDSS 2009»
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
142 views 117 votes 15 years 6 months ago  CCS 2003»
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
85 views 98 votes 15 years 2 months ago  FORTE 2004»
This paper proposes an algorithm for the construction of an MSC graph from a given set of actual behaviors of an existing concurrent system which has repetitive subfunctions. Such ...
87 views 134 votes 15 years 5 months ago  DEBS 2007»
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
260 views 158 votes 14 years 1 months ago  COMPSYSTECH 2011»
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
166 views 117 votes 15 years 4 months ago  WADT 1998»
Graph transformation systems have been introduced for the formal specification of software systems. States are thereby modeled as graphs, and computations as graph derivations acco...