Sciweavers

1737 search results - page 260 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
93
Voted
ESORICS
1994
Springer
15 years 6 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
105
Voted
CSFW
2009
IEEE
15 years 9 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
104
Voted
IC
2004
15 years 4 months ago
Controlling Inbound Traffic
This work considers the problem of prioritizing the inbound TCP traffic of an organization network. The objective is to allocate dynamically a specific share of the incoming link ...
Saad Biaz
WISE
2002
Springer
15 years 7 months ago
PTC : Proxies that Transcode and Cache in Heterogeneous Web Client Environments
Advances in computing and communication technologies have resulted in a wide variety of networked mobile devices that access data over the Internet. In this paper, we argue that s...
Aameek Singh, Abhishek Trivedi, Krithi Ramamritham...
97
Voted
ECIS
2003
15 years 4 months ago
Actor network theory and after: what's new for IS research?
The basic argument presented in the paper is that actor network theory has often been forced to adopt the ontology of interpretivism and thus suppress its own ontology. Interpreti...
Antonio Cordella, Maha Shaikh