Sciweavers

2043 search results - page 96 / 409
» Reasoning About Security Models
Sort
View
CCS
2008
ACM
14 years 19 days ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
IPCCC
2006
IEEE
14 years 4 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 5 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
TDSC
2011
13 years 5 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
IAT
2006
IEEE
14 years 4 months ago
Goal-Oriented Development of BDI Agents: The PRACTIONIST Approach
The representation of goals and the ability to reason about them play an important role in goal-oriented requirements analysis and modelling techniques, especially in agent-orient...
Vito Morreale, Susanna Bonura, Giuseppe Francavigl...