Sciweavers

12637 search results - page 199 / 2528
» Security for Extensible Systems
Sort
View
SASN
2006
ACM
14 years 3 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
ESORICS
2010
Springer
13 years 10 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan
ACSAC
2005
IEEE
14 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
ASWEC
2004
IEEE
14 years 1 months ago
A Process Framework for Characterising Security Properties of Component-Based Software Systems
This paper presents a security characterisation process framework for software components and their compositions in order to address the issue of trust in component based software...
Khaled M. Khan, Jun Han
ACSAC
2009
IEEE
14 years 4 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...