Sciweavers

1737 search results - page 19 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TRUSTBUS
2010
Springer
15 years 3 days ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
OOPSLA
2001
Springer
15 years 6 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
100
Voted
JNW
2008
112views more  JNW 2008»
15 years 2 months ago
A Conceptual Model for Analysis and Design of Tunable Security Services
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices ...
Stefan Lindskog, Zoltán Faigl, Anna Brunstr...
PET
2010
Springer
15 years 6 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...
110
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...