Sciweavers

515 search results - page 22 / 103
» Secure Parameters for SWIFFT
Sort
View
ICCBSS
2003
Springer
14 years 3 months ago
Estimating the Cost of Security for COTS Software
Abstract. This paper describes enhancements being made to the University of Southern California’s COnstructive COTS (COCOTS) integration cost model to address security concerns. ...
Donald J. Reifer, Barry W. Boehm, Murali Gangadhar...
MSS
2005
IEEE
138views Hardware» more  MSS 2005»
14 years 3 months ago
Security vs Performance: Tradeoffs using a Trust Framework
We present an architecture of a trust framework that can be utilized to intelligently tradeoff between security and performance in a SAN file system. The primary idea is to diffe...
Aameek Singh, Sandeep Gopisetty, Linda Duyanovich,...
ICICS
2004
Springer
14 years 3 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 10 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
JNW
2006
55views more  JNW 2006»
13 years 10 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...