Sciweavers

3451 search results - page 78 / 691
» Collaborative attack modeling
Sort
View
DBSEC
2008
152views Database» more  DBSEC 2008»
13 years 10 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
ALGORITHMICA
2002
104views more  ALGORITHMICA 2002»
13 years 9 months ago
Security of Quantum Key Distribution against All Collective Attacks
Security of quantum key distribution against sophisticated attacks is among the most important issues in quantum information theory. In this work we prove security against a very ...
Eli Biham, Michel Boyer, Gilles Brassard, Jeroen v...
RE
2006
Springer
13 years 9 months ago
Improving the Modeling of Use Case Relationship
Use-cases often capture the expected behaviors of a system and its components. During requirements analysis, it is important to understand and model the relationship among differe...
Jian Tang, Donglin Liang
ITRUST
2005
Springer
14 years 2 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin