Sciweavers

1737 search results - page 59 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
ECOOPW
1998
Springer
14 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
CRITIS
2007
13 years 10 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
14 years 3 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
MOBILITY
2009
ACM
14 years 3 months ago
A pervasive gesture-driven augmented reality prototype using wireless sensor body area networks
This paper describes the prototype implementation of a pervasive, wearable augmented reality (AR) system based on a full bodymotion-capture system using low-power wireless sensors...
Peter Barrie, Andreas Komninos, Oleksii Mandrychen...