Sciweavers

418 search results - page 46 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
VTC
2010
IEEE
124views Communications» more  VTC 2010»
13 years 6 months ago
A Novel Sampling Method for the Spatial Frequencies of Sinusoid-Based Shadowing Models
Abstract—Careful modeling of the radio channel characteristics is an important issue for system level simulations. While a number of detailed path loss, shadowing and fast fading...
Siegfried Klein, Serkan Uygungelen, Christian M. M...
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
E2EMON
2006
IEEE
13 years 11 months ago
Object-Relational DBMS for Packet-Level Traffic Analysis: Case Study on Performance Optimization
Analyzing Internet traffic at packet level involves generally large amounts of raw data, derived data, and results from various analysis tasks. In addition, the analysis often proc...
Matti Siekkinen, Ernst W. Biersack, Vera Goebel
POLICY
2007
Springer
14 years 1 months ago
Specifying and Enforcing High-Level Semantic Obligation Policies
Obligation Policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems...
Zhen Liu, Anand Ranganathan, Anton Riabov
SACMAT
2009
ACM
14 years 2 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri