Sciweavers

12478 search results - page 20 / 2496
» Secure Interaction Design
Sort
View
CCS
2006
ACM
14 years 1 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
NDSS
2000
IEEE
14 years 2 months ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...
KBSE
2007
IEEE
14 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
AGENTS
2001
Springer
14 years 2 months ago
Interaction without commitments: an initial approach
Gregg Economou, Maksim Tsvetovat, Katia P. Sycara,...
AGENTS
2000
Springer
14 years 2 months ago
Varying the user interaction within multi-agent systems
Terry R. Payne, Katia P. Sycara, Michael Lewis