Sciweavers

4330 search results - page 13 / 866
» Analyzing security architectures
Sort
View
DIMVA
2006
13 years 8 months ago
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Incomplete or improper input validation is one of the major sources of security bugs in programs. While traditional approaches often focus on detecting string related buffer overfl...
Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Kar...
ENTCS
2008
150views more  ENTCS 2008»
13 years 6 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
ICDCS
2010
IEEE
13 years 10 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
DBSEC
2000
89views Database» more  DBSEC 2000»
13 years 8 months ago
WorkFlow Analyzed for Security and Privacy in using Databases
Wouter Teepe, Reind P. van de Riet, Martin S. Oliv...