Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Quantitative Security"'
Publikováno v:
Frontiers in Physics, Vol 11 (2023)
Quantum secret sharing (QSS) protocols without entanglement have showed high security by virtue of the characteristics of quantum mechanics. However, it is still a challenge to compare the security of such protocols depending on quantitative security
Externí odkaz:
https://doaj.org/article/9cad9477835c4368b740ccf4403150de
Publikováno v:
IET Cyber-Physical Systems (2019)
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber-physical systems (CPSs) in the face of malicious attacks. The basic idea behind the proposed model is to evaluate the security of control loops equip
Externí odkaz:
https://doaj.org/article/90e16a13b06245abb4620ceaa0510c4c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Beek, Maurice H. ter, Legay, Axel, Lafuente, Alberto Lluch, Vandin, Andrea, VaMoS '20: 14th International Working Conference on Variability Modelling of Software-Intensive Systems
Publikováno v:
ter Beek, M H, Legay, A, Lluch Lafuente, A & Vandin, A 2020, Variability meets Security: Quantitative security modeling and analysis of highly customizable attack scenarios . in Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems ., 11, Association for Computing Machinery, ACM International Conference Proceeding Series, 14th International Working Conference on Variability Modelling of Software-Intensive Systems, Magdeburg, Saxony-Anhalt, Germany, 05/02/2020 . https://doi.org/10.1145/3377024.3377041
VaMoS'20-14th International Working Conference on Variability Modelling of Software-Intensive Systems, pp. 11:1–11:9, Magdeburg, Germany, 5-7 February 2020
info:cnr-pdr/source/autori:ter Beek M.H., Legay A.; Lluch Lafuente A.; Vandin A./congresso_nome:VaMoS'20-14th International Working Conference on Variability Modelling of Software-Intensive Systems/congresso_luogo:Magdeburg, Germany/congresso_data:5-7 February 2020/anno:2020/pagina_da:11:1/pagina_a:11:9/intervallo_pagine:11:1–11:9
VaMoS
Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems
VaMoS'20-14th International Working Conference on Variability Modelling of Software-Intensive Systems, pp. 11:1–11:9, Magdeburg, Germany, 5-7 February 2020
info:cnr-pdr/source/autori:ter Beek M.H., Legay A.; Lluch Lafuente A.; Vandin A./congresso_nome:VaMoS'20-14th International Working Conference on Variability Modelling of Software-Intensive Systems/congresso_luogo:Magdeburg, Germany/congresso_data:5-7 February 2020/anno:2020/pagina_da:11:1/pagina_a:11:9/intervallo_pagine:11:1–11:9
VaMoS
Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems
We present a framework for quantitative security modeling and analysis of highly customizable attack scenarios, which resulted as a spin-off from our research in software product line engineering. The graphical security models are based on attributed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b2f5010cbdf805b77420e3b3846755fd
https://orbit.dtu.dk/en/publications/e4a7ecff-45c8-4255-a6ca-ec96e22739a5
https://orbit.dtu.dk/en/publications/e4a7ecff-45c8-4255-a6ca-ec96e22739a5
Autor:
Kumar, Rajesh, Rensink, Arend, Stoelinga, Mariëlle I.A., Haddad, Hisham M., Wainwright, Roger L., Chbeir, Richard
Publikováno v:
SAC
SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1907-1915
STARTPAGE=1907;ENDPAGE=1915;TITLE=SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing
SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1907-1915
STARTPAGE=1907;ENDPAGE=1915;TITLE=SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied Computing
We introduce a formal specification language locks, that allow security practitioners to express as well as compose security goals in a convenient manner. locks supports the specification of the most common security properties over generic attributes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6c08938ac556aee2593ea20f42a2acdf
https://doi.org/10.1145/3167132.3167336
https://doi.org/10.1145/3167132.3167336
Publikováno v:
Journal of information assurance and security. 9(3):118-127
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Thus, penetration testing has so far been used as a qualitative research method. To enable quantitative
Autor:
Meng, Tianhui
While the last decades witness great advances in hardware technology, new mobile applications have also become much more demanding. Hence, mobile devices still face the restrictions in resources, such as battery life, storage capacity, and processor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4732::8343b53554d23440be7c68b41621f09f
https://doi.org/10.17169/refubium-14724
https://doi.org/10.17169/refubium-14724
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ilaria Matteucci, Francesco Santini
Publikováno v:
Data Privacy Management and Security Assurance ISBN: 9783319470719
DPM/QASA@ESORICS
QASA: 5th International Workshop on Quantitative Aspects of Security Assurance, pp. 34–50, Heraklion, Crete, Greece, 26-27/09/2016
info:cnr-pdr/source/autori:Matteucci I., Santini F./congresso_nome:QASA: 5th International Workshop on Quantitative Aspects of Security Assurance/congresso_luogo:Heraklion, Crete, Greece/congresso_data:26-27%2F09%2F2016/anno:2016/pagina_da:34/pagina_a:50/intervallo_pagine:34–50
DPM/QASA@ESORICS
QASA: 5th International Workshop on Quantitative Aspects of Security Assurance, pp. 34–50, Heraklion, Crete, Greece, 26-27/09/2016
info:cnr-pdr/source/autori:Matteucci I., Santini F./congresso_nome:QASA: 5th International Workshop on Quantitative Aspects of Security Assurance/congresso_luogo:Heraklion, Crete, Greece/congresso_data:26-27%2F09%2F2016/anno:2016/pagina_da:34/pagina_a:50/intervallo_pagine:34–50
In this paper we address the problem of identifying what local properties the sub-components of a system have to satisfy in order to guarantee a (security) property on the behaviour of the whole system. We associate each action with a value. Hence, w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ffb3406fb095fde15737e72ef649e910
https://doi.org/10.1007/978-3-319-47072-6_3
https://doi.org/10.1007/978-3-319-47072-6_3