Sciweavers

132 search results - page 18 / 27
» Understanding Dubious Future Problems
Sort
View
SEKE
2005
Springer
14 years 26 days ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
CCS
2004
ACM
14 years 23 days ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
HUC
2004
Springer
14 years 23 days ago
The Carrot Approach: Encouraging Use of Location Systems
The Active Bat system provides the ability to locate users and equipment with a high degree of accuracy and coverage. Despite this, participation is low. We are concerned that this...
Kieran Mansley, Alastair R. Beresford, David Scott
CCS
2003
ACM
14 years 18 days ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
WETICE
1998
IEEE
13 years 11 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...