Sciweavers

3420 search results - page 534 / 684
» A Language-Based Approach to Security
Sort
View
GEOINFO
2007
15 years 4 months ago
The Development of a Large Scale Geospatial Telecommunications Application Independent from GIS
This article presents the evolution of a very large geospatial database and application developed for telecommunications outside plant management. The needs for the construction of...
Eliane Z. Victorelli Dias, Geovane Cayres Magalh&a...
IJCAI
2007
15 years 4 months ago
Multi-Agent System that Attains Longevity via Death
We propose a novel approach to self-regenerating systems which require continuous operation, such as security surveillance. For that aim we introduce HADES, a self-regenerating co...
Megan Olsen, Hava T. Siegelmann
MKWI
2008
168views Business» more  MKWI 2008»
15 years 4 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
PST
2008
15 years 4 months ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé
151
Voted
SICHERHEIT
2008
15 years 4 months ago
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
Abstract: Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the visitor's browser are posing a serious threat to client security, comprom...
Ali Ikinci, Thorsten Holz, Felix C. Freiling