Sciweavers

CCS
2006
ACM
14 years 3 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
CCS
2006
ACM
14 years 3 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
CCS
2006
ACM
14 years 3 months ago
Measuring the attack surfaces of two FTP daemons
Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system adminis...
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Fly...
CCS
2006
ACM
14 years 3 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
CCS
2006
ACM
14 years 3 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
CCS
2006
ACM
14 years 3 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
CCS
2006
ACM
14 years 3 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
CCS
2006
ACM
14 years 3 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen