Sciweavers

529 search results - page 65 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
CCS
2010
ACM
13 years 7 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
TVLSI
2010
13 years 2 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
SELMAS
2004
Springer
14 years 1 months ago
CAMLE: A Caste-Centric Agent-Oriented Modelling Language and Environment
Abstract. This paper presents an agent-oriented modelling language and environment CAMLE. It is based on the conceptual model of multi-agent systems (MAS) proposed and formally def...
Lijun Shan, Hong Zhu
DSOM
2008
Springer
13 years 9 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
MEMOCODE
2003
IEEE
14 years 28 days ago
Real-time Property Preservation in Approximations of Timed Systems
Formal techniques have been widely applied in the design of real-time systems and have significantly helped detect design errors by checking real-time properties of the model. Ho...
Jinfeng Huang, Jeroen Voeten, Marc Geilen