Sciweavers

1395 search results - page 202 / 279
» Communication Security in Multi-agent Systems
Sort
View
ENTCS
2007
104views more  ENTCS 2007»
13 years 10 months ago
Exogenous Probabilistic Computation Tree Logic
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evo...
Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan,...
TSE
2010
230views more  TSE 2010»
13 years 4 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
IEEEARES
2007
IEEE
14 years 4 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
ACSAC
2006
IEEE
14 years 4 months ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
RAID
2010
Springer
13 years 8 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh