Sciweavers

441 search results - page 3 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
IFIP
2007
Springer
14 years 12 days ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
DSN
2009
IEEE
13 years 4 months ago
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
Distributed intelligence and secure interconnected communication networks constitute recognized key factors for the economic operation of electricity infrastructures in competitiv...
Giovanna Dondossola, Fabrizio Garrone, Judit Szant...
AOSD
2004
ACM
13 years 11 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 18 days ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
PRDC
2008
IEEE
14 years 19 days ago
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability)
Multiserver operating systems have great potential to improve dependability, but, paradoxically, are paired with inherently more complex interprocess communication (IPC). Several ...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...