Sciweavers

1028 search results - page 52 / 103
» Using Attack Graphs to Design Systems
Sort
View
102 views 90 votes 15 years 7 months ago  IEEEIAS 2008»
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
104 views 100 votes 15 years 5 months ago  INFOCOM 2000»
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
84 views 101 votes 15 years 1 months ago  CORR 2007»
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
66 views 90 votes 15 years 1 months ago  SIAMCOMP 2000»
We consider a system of uniform recurrence equations (URE) of dimension one. We show how its computation can be carried out using minimal memory size with several synchronous proc...
109 views 108 votes 15 years 7 months ago  AE 2007»
Abstract. We follow up on the work of Ebner[1] in studying representations for evolutionary design of objects. We adopt both the method and the simulation framework, and perform mo...
72 views 105 votes 15 years 1 months ago  JSA 1998»
In this paper, we present a network conscious approach to designing distributed real-time systems. Given a task graph design of the system, the end-to-end constraints on the input...
142 views 114 votes 15 years 5 months ago  FPGA 1998»
Multi-FPGA systems (MFSs) are used as custom computing machines, logic emulators and rapid prototyping vehicles. A key aspect of these systems is their programmable routing archit...
142 views 110 votes 15 years 1 months ago  JNW 2006»
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
117 views 102 votes 15 years 7 months ago  IPCCC 2006»
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
127 views 117 votes 15 years 7 months ago  COMPSAC 2008»
In this paper, we describe a framework for the computeraided evolution of the designs of object-oriented software systems. Evolution mechanisms are software structures that prepar...