In this paper, we discuss new analytical methods for computing Value-at-Risk (VaR)andacreditexposureprofile.UsingaMonteCarlosimulationapproachasabenchmark, we find that the analy...
Ben De Prisco, Ian Iscoe, Alexander Y. Kreinin, Ah...
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
Manageability directly influences a system's reliability, availability, security, and safety, thus being a key ingredient of system dependability. Alas, we do not have today ...
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
This paper addresses the problem of improving quality of security for real-time parallel applications on heterogeneous clusters. We propose a new security- and heterogeneity-drive...