Sciweavers

1587 search results - page 119 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
SICHERHEIT
2010
15 years 2 months ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius
CCS
2006
ACM
15 years 8 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
CCS
2001
ACM
15 years 9 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
CCS
2006
ACM
15 years 8 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 8 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore