Sciweavers

1028 search results - page 99 / 103
» Using Attack Graphs to Design Systems
Sort
View
150 views 107 votes 14 years 11 months ago  ISPDC 2010»
—Providing independent uniform samples from a system population poses considerable problems in highly dynamic settings, like P2P systems, where the number of participants and the...
90 views 108 votes 15 years 6 months ago  ACSAC 2003»
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
182 views 187 votes 16 years 2 months ago  ICDE 2008»
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...
112 views 140 votes 15 years 27 days ago  SCP 2002»
The agent paradigm can be seen as an extension of the notion of (active) objects by concepts like autonomy and cooperation. Mainstream object-oriented modeling techniques do not a...
157 views 129 votes 15 years 7 months ago  INFOCOM 2007»
— Recently, research on disconnected networks has been fostered by several studies on delay-tolerant networks, which are designed in order to sustain disconnected operations. We ...
101 views 111 votes 14 years 11 months ago  JCO 2010»
Abstract Polynomial-time data reduction is a classical approach to hard graph problems. Typically, particular small subgraphs are replaced by smaller gadgets. We generalize this ap...
104 views 96 votes 16 years 2 months ago  DAC 2000»
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
130 views 87 votes 15 years 5 months ago  CRITIS 2006»
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
122 views 105 votes 15 years 5 months ago  ICSE 1999»
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
158 views 122 votes 15 years 8 months ago  SAC 2009»
Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. T...