Sciweavers

1875 search results - page 8 / 375
» Modeling the Security of Steganographic Systems
Sort
View
SIS
2004
13 years 11 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
ESORICS
2005
Springer
14 years 3 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
ACSAC
1999
IEEE
14 years 2 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely
DEXA
2009
Springer
88views Database» more  DEXA 2009»
14 years 1 months ago
Significance-Based Failure and Interference Detection in Data Streams
Detecting the failure of a data stream is relatively easy when the stream is continually full of data. The transfer of large amounts of data allows for the simple detection of inte...
Nickolas J. G. Falkner, Quan Z. Sheng
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen