Sciweavers

1028 search results - page 79 / 103
» Using Attack Graphs to Design Systems
Sort
View
115 views 119 votes 15 years 29 days ago  JCS 2002»
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
119 views 103 votes 14 years 10 months ago  AISS 2010»
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
134 views 123 votes 15 years 1 months ago  CERA 2002»
: Many industries are shifting from mass production to mass customization, which demands quick response to the needs of individual customers with high quality and low costs. The de...
164 views 133 votes 15 years 6 months ago  ICSM 2002»
In re-engineering object-oriented legacy code, it is frequently useful to introduce a design pattern in order to improve specific non-functional requirements (e.g., maintainabili...
79 views 105 votes 15 years 4 months ago  ICALP 2000»
Message Sequence Charts (MSCs) are an attractive visual formalism widely used to capture system requirements during the early design stages in domains such as telecommunication sof...
117 views 83 votes 15 years 1 months ago  BIRTHDAY 2010»
Abstract. The error-prone process of formal specification and verification of large systems requires an efficient, evolutionary formal development approach. Development graphs have...
106 views 92 votes 15 years 5 months ago  ACSAC 2004»
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
140 views 111 votes 15 years 7 months ago  CP 2007»
The increasing levels of system integration in Multi-Processor System-on-Chips (MPSoCs) emphasize the need for new design flows for efficient mapping of multi-task applications o...
126 views 85 votes 16 years 2 months ago  DAC 2005»
Signal processing and multimedia applications are often implemented on resource constrained embedded systems. It is therefore important to find implementations that use as little ...
159 views 142 votes 14 years 8 months ago  CORR 2011»
Abstract—In distributed storage systems built using commodity hardware, it is necessary to store multiple replicas of every data chunk in order to ensure system reliability. In s...