Sciweavers

3482 search results - page 154 / 697
» Designing for security
Sort
View
125
Voted
ATAL
2011
Springer
14 years 2 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
JNW
2008
177views more  JNW 2008»
15 years 2 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
115
Voted
CCS
2008
ACM
15 years 4 months ago
EON: modeling and analyzing dynamic access control systems with logic programs
We present EON, a logic-programming language and tool that can be used to model and analyze dynamic access control systems. Our language extends Datalog with some carefully design...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani...
116
Voted
CCS
2009
ACM
15 years 9 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
SOUPS
2010
ACM
15 years 6 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash