Sciweavers

269 search results - page 37 / 54
» Using model-based security analysis in component-oriented sy...
Sort
View
ICSE
2005
IEEE-ACM
14 years 7 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
FSE
2011
Springer
263views Cryptology» more  FSE 2011»
12 years 11 months ago
Practical Near-Collisions on the Compression Function of BMW
Abstract. Blue Midnight Wish (BMW) is one of the fastest SHA-3 candidates in the second round of the competition. In this paper we study the compression function of BMW and we obta...
Gaëtan Leurent, Søren S. Thomsen
ESORICS
2004
Springer
14 years 1 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
DOLAP
2009
ACM
14 years 2 months ago
LMDQL: link-based and multidimensional query language
The current commercial and academic OLAP tools do not process XML data that make use of XLink. To develop OLAP systems for helping in the analysis of such data, this paper propose...
Paulo Caetano da Silva, Fábio Santos Souza,...
IEEEPACT
2009
IEEE
14 years 2 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood