Sciweavers

64 search results - page 3 / 13
» Simulation Verification and Validation by Dynamic Policy Enf...
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
WSC
2001
13 years 8 months ago
Enabling smooth and scalable dynamic 3D visualization of discrete-event construction simulations
Visualizing simulated construction operations is an effective means of communicating the logic and the inner working of simulation models in a comprehensive and comprehendible man...
Vineet R. Kamat, Julio C. Martínez
CCR
2008
84views more  CCR 2008»
13 years 7 months ago
Modeling internet topology dynamics
Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. Whi...
Hamed Haddadi, Steve Uhlig, Andrew W. Moore, Richa...
JHSN
2006
95views more  JHSN 2006»
13 years 7 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...