Sciweavers

3420 search results - page 534 / 684
» A Language-Based Approach to Security
Sort
View
GEOINFO
2007
13 years 11 months ago
The Development of a Large Scale Geospatial Telecommunications Application Independent from GIS
This article presents the evolution of a very large geospatial database and application developed for telecommunications outside plant management. The needs for the construction of...
Eliane Z. Victorelli Dias, Geovane Cayres Magalh&a...
IJCAI
2007
13 years 11 months ago
Multi-Agent System that Attains Longevity via Death
We propose a novel approach to self-regenerating systems which require continuous operation, such as security surveillance. For that aim we introduce HADES, a self-regenerating co...
Megan Olsen, Hava T. Siegelmann
MKWI
2008
168views Business» more  MKWI 2008»
13 years 11 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
PST
2008
13 years 11 months ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé
SICHERHEIT
2008
13 years 11 months ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling