Sciweavers

348 search results - page 10 / 70
» On a Network Forensics Model For Information Security
Sort
View
ACSAC
2002
IEEE
14 years 9 days ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
ACSAC
2001
IEEE
13 years 11 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ICDCSW
2005
IEEE
14 years 29 days ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
JSAC
2006
181views more  JSAC 2006»
13 years 7 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
FOSAD
2000
Springer
13 years 11 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman