Sciweavers

2043 search results - page 37 / 409
» Reasoning About Security Models
Sort
View
OTM
2007
Springer
14 years 4 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
SOUPS
2010
ACM
14 years 2 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
EUC
2005
Springer
14 years 3 months ago
A Unified Context Model: Bringing Probabilistic Models to Context Ontology
Abstract. Ontology is a promising tool to model and reason about context information in pervasive computing environment. However, ontology does not support representation and reaso...
Binh An Truong, Young-Koo Lee, Sungyoung Lee
AI
2001
Springer
14 years 1 months ago
Learning about Constraints by Reflection
A system's constraints characterizes what that system can do. However, a dynamic environment may require that a system alter its constraints. If feedback about a specific situ...
J. William Murdock, Ashok K. Goel
SIGSOFT
2007
ACM
14 years 11 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna