Sciweavers

14704 search results - page 2585 / 2941
» computing 2007
Sort
View
CCS
2007
ACM
15 years 11 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
CCS
2007
ACM
15 years 11 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CCS
2007
ACM
15 years 11 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
CCS
2007
ACM
15 years 11 months ago
Program obfuscation: a quantitative approach
Despite the recent advances in the theory underlying obfuscation, there still is a need to evaluate the quality of practical obfuscating transformations more quickly and easily. T...
Bertrand Anckaert, Matias Madou, Bjorn De Sutter, ...
187
Voted
CEFP
2007
Springer
15 years 11 months ago
Proving Properties of Lazy Functional Programs with Sparkle
This tutorial paper aims to provide the necessary expertise for working with the proof assistant Sparkle, which is dedicated to the lazy functional programming language Clean. The ...
Maarten de Mol, Marko C. J. D. van Eekelen, Rinus ...
« Prev « First page 2585 / 2941 Last » Next »