Sciweavers

1028 search results - page 95 / 103
» Using Attack Graphs to Design Systems
Sort
View
176 views 104 votes 15 years 7 months ago  CIKM 2009»
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
110 views 93 votes 15 years 1 months ago  CORR 2007»
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
106 views 96 votes 15 years 7 months ago  PDCAT 2007»
We present the architecture of nreduce, a distributed virtual machine which uses parallel graph reduction to run programs across a set of computers. It executes code written in a ...
107 views 97 votes 15 years 10 months ago  ICCAD 2007»
— Computing counterexamples is a crucial task for error diagnosis and debugging of sequential systems. If an implementation does not fulfill its specification, counterexamples ...
111 views 103 votes 15 years 6 months ago  SLIP 2003»
In the past, a priori interconnect prediction, based on Rent’s rule, has been applied mainly for technology evaluation and roadmap applications. These applications do not requir...
115 views 101 votes 15 years 7 months ago  EDOC 2007»
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
112 views 112 votes 15 years 6 months ago  ICDCSW 2005»
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
717 views 148 votes 15 years 6 months ago  VIZSEC 2004»
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
116 views 111 votes 15 years 5 months ago  WECWIS 1999»
In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
99 views 83 votes 15 years 6 months ago  IWSOC 2003»
The availability of high-level design entry tooling is crucial for the viability of any reconfigurable SoC architecture. This paper presents a template generation method to extra...