Sciweavers

136 search results - page 8 / 28
» Automated Analysis of Permission-Based Security Using UMLsec
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
CSFW
2010
IEEE
13 years 12 months ago
Automating Open Bisimulation Checking for the Spi Calculus
We consider the problem of automating open bisimulation checking for the spi-calculus, an extension of the pi-calculus with cryptographic primitives. The notion of open bisimulatio...
Alwen Tiu, Jeremy E. Dawson
CCS
2009
ACM
14 years 3 months ago
Mixed-initiative security agents
Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge, and require...
Rachel Greenstadt, Sadia Afroz, Michael Brennan
TIM
2011
172views more  TIM 2011»
13 years 3 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...
CCS
2011
ACM
12 years 8 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...