Sciweavers

2270 search results - page 89 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
EUROMICRO
1999
IEEE
14 years 1 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
14 years 14 days ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
ENTCS
2010
130views more  ENTCS 2010»
13 years 9 months ago
Compositional System Security with Interface-Confined Adversaries
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various comp...
Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, ...
MA
1998
Springer
167views Communications» more  MA 1998»
14 years 1 months ago
Reactive Tuple Spaces for Mobile Agent Coordination
Mobile active computational entities introduce peculiar problems in the coordination of distributed application components. The paper surveys several coordination models for mobil...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli