Sciweavers

2270 search results - page 64 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
JNW
2006
55views more  JNW 2006»
13 years 8 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
IM
2003
13 years 10 months ago
Multiple Authorization - A Model and Architecture for Increased, Practical Security
: Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations...
Gerald Vogt
ESORICS
2006
Springer
14 years 12 days ago
Timing-Sensitive Information Flow Analysis for Synchronous Systems
Timing side channels are a serious threat to the security of cryptographic algorithms. This paper presents a novel method for the timing-sensitive analysis of information flow in s...
Boris Köpf, David A. Basin
HYBRID
2009
Springer
14 years 3 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
LAMAS
2005
Springer
14 years 2 months ago
An Overview of Cooperative and Competitive Multiagent Learning
Abstract Multi-agent systems (MASs) is an area of distributed artificial intelligence that emphasizes the joint behaviors of agents with some degree of autonomy and the complexiti...
Pieter Jan't Hoen, Karl Tuyls, Liviu Panait, Sean ...