Sciweavers

TC
2008
14 years 10 days ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...
CSREASAM
2009
14 years 1 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
CHI
2010
ACM
14 years 3 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
FGR
2004
IEEE
97views Biometrics» more  FGR 2004»
14 years 4 months ago
Recognizing Song-Based Blink Patterns: Applications for Restricted and Universal Access
We introduce a novel system for recognizing patterns of eye blinks for use in assistive technology interfaces and security systems. First, we present a blink-based interface for c...
Tracy L. Westeyn, Thad Starner
ICFP
2000
ACM
14 years 4 months ago
Static enforcement of security with types
A number of security systems for programming languages have recently appeared, including systems for enforcing some form of ac
Christian Skalka, Scott F. Smith
SEKE
2004
Springer
14 years 5 months ago
Applying Aspect-Orientation in Designing Security Systems: A Case Study
As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is necessary to come up with an approach to guide the ...
Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin...
ESORICS
2005
Springer
14 years 6 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 6 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...