Sciweavers

1028 search results - page 129 / 206
» Using Attack Graphs to Design Systems
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 1 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
ESOP
2005
Springer
14 years 3 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
WPES
2006
ACM
14 years 3 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
MOZ
2004
Springer
14 years 3 months ago
The XDG Grammar Development Kit
Abstract. Extensible Dependency Grammar (XDG) is a graph description language whose formulas can be solved by constraint programming. XDG is designed so as to yield a declarative a...
Ralph Debusmann, Denys Duchier, Joachim Niehren
INFOVIS
1999
IEEE
14 years 1 months ago
Constellation: A Visualization Tool for Linguistic Queries from MindNet
ct Constellation is a visualization system for the results of queries from the MindNet natural language semantic network. Constellation is targeted at helping MindNet's creato...
Tamara Munzner, François Guimbretièr...