Sciweavers

1028 search results - page 56 / 103
» Using Attack Graphs to Design Systems
Sort
View
97 views 103 votes 15 years 5 months ago  IPPS 1998»
Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for des...
120 views 103 votes 15 years 7 months ago  SENSYS 2005»
Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems a...
155 views 134 votes 15 years 6 months ago  SP 2003»
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
116 views 119 votes 15 years 7 months ago  ICC 2007»
Abstract—Skip Tree Graph is a novel, distributed, data structure for peer-to-peer systems that supports exact-match and order-based queries such as range queries efficiently. It...
99 views 102 votes 15 years 5 months ago  ICCAD 1999»
In this paper, an internal design model called FunState (functions driven by state machines) is presented that enables the representation of different types of system components a...
131 views 97 votes 15 years 2 months ago  USS 2004»
It is well known that it is insecure to use the access(2) system call in a setuid program to test for the ability of the program's executor to access a file before opening sa...
108 views 88 votes 15 years 1 months ago  IEEESP 2006»
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
99 views 83 votes 15 years 7 months ago  IEEEARES 2008»
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
293 views 130 votes 13 years 3 months ago  ESORICS 2012»
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
252 views 157 votes 13 years 3 months ago  SDM 2012»
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...