Sciweavers

1028 search results - page 49 / 103
» Using Attack Graphs to Design Systems
Sort
View
119 views 91 votes 16 years 2 months ago  WWW 2004»
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because appl...
168 views 166 votes 15 years 5 months ago  WOSP 1998»
The POEMS project is creating an environment for end-to-end performance modeling of complex parallel and distributed systems, spanning the domains of application software, runti...
94 views 111 votes 15 years 7 months ago  ICSM 2006»
The association between the description of a concern (e.g., a feature) and the code that implements it is valuable information that can degrade as the code of a system evolves. We...
120 views 99 votes 15 years 8 months ago  ATAL 2009»
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
133 views 84 votes 15 years 7 months ago  IPCCC 2006»
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
124 views 114 votes 15 years 2 months ago  FLAIRS 2003»
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
113 views 122 votes 15 years 2 months ago  PDPTA 2008»
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
116 views 92 votes 15 years 7 months ago  AOSD 2006»
OOP style requires programmers to organize their code according to objects (or nouns, using natural language as a metaphor), causing a program’s actions (verbs) to become scatte...
132 views 111 votes 15 years 5 months ago  CODES 2004»
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
150 views 115 votes 15 years 2 months ago  CSREASAM 2006»
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...