Sciweavers

SAFECOMP
2015
Springer
8 years 3 months ago
Sequential and Parallel Attack Tree Modelling
The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many s...
Florian Arnold, Dennis Guck, Rajesh Kumar, Mari&eu...
SAFECOMP
2015
Springer
8 years 3 months ago
Simulative Evaluation of Security Attacks in Networked Critical Infrastructures
ICT is becoming a fundamental and pervasive component of critical infrastructures (CIs). Despite the advantages that it brings about, ICT also exposes CIs to a number of security a...
Marco Tiloca, Francesco Racciatti, Gianluca Dini
SAFECOMP
2015
Springer
8 years 3 months ago
Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design
This paper addresses quantifying security risks associated with data assets within design models of embedded systems. Attack and system behaviours are modelled as time-dependent st...
Maria Vasilevskaya, Simin Nadjm-Tehrani
SAFECOMP
2015
Springer
8 years 3 months ago
Improving Dependability of Vision-Based Advanced Driver Assistance Systems Using Navigation Data and Checkpoint Recognition
Advanced Driver Assistance Systems (ADAS), like adaptive cruise control, collision avoidance systems, and, ultimately, piloted and autonomous driving are increasingly evolving into...
Ayhan Mehmed, Sasikumar Punnekkat, Wilfried Steine...
SAFECOMP
2015
Springer
8 years 3 months ago
Requirement Engineering for Functional Alarm System for Interoperable Medical Devices
Abstract. This paper addresses the problem of high-assurance operation for medical cyber-physical systems built from interoperable medical devices. Such systems are different from...
Krishna K. Venkatasubramanian, Eugene Y. Vasserman...
SAFECOMP
2015
Springer
8 years 3 months ago
Automatic Architecture Hardening Using Safety Patterns
Safety critical systems or applications must satisfy safety requirements ensuring that catastrophic consequences of combined component failures are avoided or kept below a satisfyi...
Kevin Delmas, Rémi Delmas, Claire Pagetti
CANS
2015
Springer
32views Cryptology» more  CANS 2015»
8 years 3 months ago
PUDA - Privacy and Unforgeability for Data Aggregation
Existing work on data collection and analysis for aggregation is mainly focused on confidentiality issues. That is, the untrusted Aggregator learns only the aggregation result wit...
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek &Oum...
CANS
2015
Springer
29views Cryptology» more  CANS 2015»
8 years 3 months ago
On the Weaknesses of PBKDF2
Andrea Visconti, Simone Bossi, Hany Ragab, Alexand...
CANS
2015
Springer
37views Cryptology» more  CANS 2015»
8 years 3 months ago
Security of Linear Secret-Sharing Schemes Against Mass Surveillance
Abstract Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass survei...
Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranel...