Sciweavers

906 search results - page 152 / 182
» Language and program design for functional dependencies
Sort
View
IFIP
2007
Springer
14 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
SCP
2011
341views Communications» more  SCP 2011»
13 years 5 months ago
A generic topology library
In the field of scientific computing there is a manifold of software applications and tools available which provide methods and libraries for the solution of very specific prob...
René Heinzl, Philipp Schwaha
ICALP
2005
Springer
14 years 4 months ago
Simple Extractors via Constructions of Cryptographic Pseudo-random Generators
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-r...
Marius Zimand
ASPLOS
2008
ACM
14 years 20 days ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
RSP
2003
IEEE
169views Control Systems» more  RSP 2003»
14 years 3 months ago
Rapid Prototyping and Incremental Evolution Using SLAM
The paper shows the outlines of the SLAM system and how its design is suitable for automating rapid prototyping. The system includes a very expressive object oriented specificati...
Ángel Herranz-Nieva, Juan José Moren...