Sciweavers

126 search results - page 23 / 26
» Computational Forensic Techniques for Intellectual Property ...
Sort
View
VIZSEC
2005
Springer
14 years 3 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
SACMAT
2009
ACM
14 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
INFOCOM
2007
IEEE
14 years 4 months ago
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, ...
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
14 years 3 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
ENC
2005
IEEE
14 years 3 months ago
SELES: An e-Voting System for Medium Scale Online Elections
— Recent advances in communication networks and cryptographic techniques have made possible to consider online voting systems as a feasible alternative to conventional elections....
Claudia García-Zamora, Francisco Rodr&iacut...