Sciweavers

1407 search results - page 43 / 282
» Systems Theory Model for Information Security
Sort
View
CCS
2008
ACM
13 years 10 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
ISTA
2008
13 years 9 months ago
Towards a Theory of Services
Abstract. Service-oriented Computing and Service-oriented Architectures aspire to better exploit existing middleware technologies. To this end, a more flexible, platform independen...
Wolfgang Reisig
FOSAD
2009
Springer
14 years 2 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
FC
2009
Springer
135views Cryptology» more  FC 2009»
14 years 2 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
CONTEXT
2001
Springer
14 years 15 days ago
Practical Context Transformation for Information System Interoperability
This paper discusses the use of contextual reasoning, i.e. context transformation for achieving semantic interoperability in heterogeneous information systems. We introduce termino...
Holger Wache, Heiner Stuckenschmidt