Sciweavers

441 search results - page 5 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
USS
2008
14 years 3 days ago
Security Benchmarking using Partial Verification
Implementation-level vulnerabilities are a persistent threat to the security of computing systems. We propose using the results of partially-successful verification attempts to pl...
Thomas E. Hart, Marsha Chechik, David Lie
STORAGESS
2005
ACM
14 years 3 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
COREGRID
2007
Springer
14 years 4 months ago
Threat Analysis and Attacks on XtreemOS: a Grid-enabled Operating System
Amit D. Lakhani, Erica Y. Yang, Brian Matthews, Ia...
CAI
2005
Springer
13 years 9 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
ISI
2006
Springer
13 years 9 months ago
Distributing the Cost of Securing a Transportation Infrastructure
We address the problem of fairly distributing the cost of system-wide improvements to the security of a transportation infrastructure over the beneficiaries. We present a framework...
Sudarshan S. Chawathe