Sciweavers

67 search results - page 8 / 14
» Toward a Mathematical Foundation for Information Flow Securi...
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 8 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
SAC
2004
ACM
14 years 25 days ago
Towards multisensor data fusion for DoS detection
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Christos Siaterlis, Basil S. Maglaris
ITCC
2005
IEEE
14 years 29 days ago
An Autonomous Pricing Strategy toward Market Economy in Computational Grids
One of the key steps in economy based grid resource allocation is to make reasonable prices for the grid resources. For resources’ prices decide the resource flow in the Grid, f...
Yang Jin, Shoubao Yang, Maosheng Li, Qianfei Fu
CSFW
1999
IEEE
13 years 11 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
SAS
2004
Springer
134views Formal Methods» more  SAS 2004»
14 years 22 days ago
Towards Declarative Programming for Web Services
ness Refinement in Abstract Symbolic Trajectory Evaluation . . . . 38 Mila Dalla Preda Constraint-Based Linear-Relations Analysis . . . . . . . . . . . . . . . . . . . . . . . . ....
Sheila A. McIlraith