Sciweavers

756 search results - page 33 / 152
» Modeling Computational Security in Long-Lived Systems
Sort
View
JAIR
2011
214views more  JAIR 2011»
13 years 17 days ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
STORAGESS
2005
ACM
14 years 3 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
WETICE
2000
IEEE
14 years 2 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop
ECUMN
2007
Springer
14 years 3 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 2 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....