Filters








92,317 Hits in 6.0 sec

Classification of Security Properties [chapter]

Riccardo Focardi, Roberto Gorrieri
2001 Lecture Notes in Computer Science  
This paper mainly follows [21] and covers the first part of the course "Classification of Security Properties" given by Roberto Gorrieri and Riccardo Focardi at FOSAD'00 school.  ...  A classification of security properties is thus of interest for understanding the relationships among different definitions and for evaluating the relative merits.  ...  This application of NI properties to network security is new to our knowledge.  ... 
doi:10.1007/3-540-45608-2_6 fatcat:i2reo2stifa27jxfzqzcxbwpha

Optical networks security: a failure management framework

Carmen Mas, Ioannis Tomkos, Ozan K. Tonguz, Benjamin B. Dingel, Werner Weiershausen, Achyut K. Dutta, Ken-Ichi Sato
2003 Optical Transmission Systems and Equipment for WDM Networking II  
A classification of these components based on the masking and alarming properties is proposed.  ...  Section 3 gives a classification of the components of a transparent optical network.  ...  FAILURES IN TRANSPARENT NETWORKS This section focuses on the physical security of optical networks, i.e., the reliability of an optical network from the physical layer point of view.  ... 
doi:10.1117/12.510998 fatcat:o6ilxlqglnbrve6hs65lcvnbnu

Classification of security properties in a Linda-like process algebra

Alessandro Aldini
2006 Science of Computer Programming  
We provide a classification of noninterference-based security properties for the formal analysis of secure information flow in concurrent and distributed systems.  ...  the security properties, by giving a new intuition to the relative merits.  ...  From the observations above, we can derive the classification of = rd -based security properties depicted in Fig. 5 .  ... 
doi:10.1016/j.scico.2005.07.010 fatcat:72y4knahrbcffnkd7rhslqymyu

Yoyo trick on type‐II generalised Feistel networks

Tao Hou, Ting Cui
2021 IET Information Security  
This work presents a structural attack against the type-II generalised Feistel network (GFN) with secret internal functions.  ...  First, equivalent structures of the 7-round type-II GFN are provided, which helps reduce the first guess of the secret round functions.  ...  The work in this article is supported by the National Natural Science Foundation of China (Grant nos. 61772547, 61902428, 61802438, 61402523).  ... 
doi:10.1049/ise2.12035 fatcat:75q7e6sba5btnhjsvd6sefhate

Min-max hyperellipsoidal clustering for anomaly detection in network security

S. Sarasamma, Q.A. Zhu
2006 IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)  
A novel hyperellipsoidal clustering technique is presented for an intrusion-detection system in network security.  ...  An evaluation based on the inclusiveness and exclusiveness of samples with respect to specific criteria is applied to accretively learn the output clusters of the neural network.  ...  We utilize the classification capability of this ESOM to detect new anomalies in network header data.  ... 
doi:10.1109/tsmcb.2006.870629 pmid:16903372 fatcat:u3vi76ge6vgflclknz3lrnk3va

Network security project management: a security policy-based approach

Jihene Krichene, Noureddine Boudriga
2007 2007 IEEE International Conference on Systems, Man and Cybernetics  
Managing security projects is a delicate activity due to the evolution of attacks.  ...  Real security projects are used to prove the accuracy of the new methodology.  ...  II.  ... 
doi:10.1109/icsmc.2007.4413707 dblp:conf/smc/KricheneB07 fatcat:c6zioh4fozc6ndsrpg3ma2x424

An Ontology for Network Security Attacks [chapter]

Andrew Simmonds, Peter Sandilands, Louis van Ekert
2004 Lecture Notes in Computer Science  
The review is used to construct a framework which is then used to define an extensible ontology for network security attacks. We present a conceptualization of this ontology in figure 1.  ...  We first consider network security services and then review threats, vulnerabilities and failure modes.  ...  From this review we present an ontology for network security attacks which shows the relationship between many of the standard classifications used, with the concep-tualization drawn in figure 1.  ... 
doi:10.1007/978-3-540-30176-9_41 fatcat:zaalaxvp3varbgmsvyxy2x3hxu

Network and database security

Errol A. Blake
2007 Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07  
compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.  ...  This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted  ...  Michael Whitman and Herb Mattord for pouring their knowledge of Information Security in their books, classroom, and lab sessions.  ... 
doi:10.1145/1409908.1409937 dblp:conf/infoseccd/Blake07 fatcat:cu7pw6t3zzgwhaw6kvtnj7cjnu

Secure Network Coding [chapter]

Sidharth Jaggi, Michael Langberg
2012 Network Coding  
Network Transform: In many of the proposed schemes, the network performs classical distributed network coding [24] .  ...  This chapter summarizes almost a decade of study in the very dynamic and intriguing field of private and reliable network communication. Overview of chapter The chapter consists of four sections.  ...  Acknowledgments The authors would like to thank Danilo Silva for many helpful discussions during the preparation of this chapter.  ... 
doi:10.1016/b978-0-12-380918-6.00007-x fatcat:qqqicae4ybgrbh4c54mkpzy2za

Composite Metrics for Network Security Analysis

Simon Enoch Yusuf, Jin B. Hong, Mengmeng Ge, Dong Seong Kim
2017 Software Networking  
There are a lot of security metrics for security analysis, but there is no systematic classification of security metrics that are based on network reachability information.  ...  To address this, we propose a systematic classification of existing security metrics based on network reachability information.  ...  The statements made herein are solely the responsibility of the authors.  ... 
doi:10.13052/jsn2445-9739.2017.007 fatcat:dpktid44urbtddhalpcnzstzdi

Composite Metrics for Network Security Analysis

Simon Enoch Yusuf, Jin B. Hong, Mengmeng Ge, Dong Seong Kim
2017 Convergence Security  
There are a lot of security metrics for security analysis, but there is no systematic classification of security metrics that is based on network reachability information.  ...  To address this, we propose a systematic classification of existing security metrics based on network reachability information.  ...  The statements made herein are solely the responsibility of the authors.  ... 
doi:10.13052/jcs2445-9992.2017.003 fatcat:mxpxnqug7vesbbsbsur2rtz52m

Prioritisation of network security services

Z. Hayat, J. Reeve, C. Boutle
2006 IEE Proceedings Information Security  
The technique is based upon compromise path analysis, which identifies critical paths in a network from a security viewpoint and is relevant in a wide range of operations from the application of security  ...  On large networks security administration tasks such as patch management and event log analysis can take many hours and even days to successfully complete even with automated solutions.  ...  Firewall rules applied by individual devices and network edge filters at any one time.  ... 
doi:10.1049/ip-ifs:20055109 fatcat:w65vlinh4bc6ximav53gsj3izi

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  nodes in the relevant parts of the network.  ...  This layer based classification of security protocols can help towards a more clear understanding of WSN security and better protocol design.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Secure and dependable software defined networks

Adnan Akhunzada, Abdullah Gani, Nor Badrul Anuar, Ahmed Abdelaziz, Muhammad Khurram Khan, Amir Hayat, Samee U. Khan
2016 Journal of Network and Computer Applications  
Despite the promising architecture of SDNs, security was not considered as part of the initial design.  ...  Moreover, security concerns are potentially augmented considering the logical centralization of network intelligence.  ...  to our main classification of SDN security augmentation.  ... 
doi:10.1016/j.jnca.2015.11.012 fatcat:m5ekztakunbzxgkuk6gfp23j3e

Patterns and Interactions in Network Security [article]

Pamela Zave, Jennifer Rexford
2020 arXiv   pre-print
Consequently, after a pragmatic classification of security attacks, the main sections of the tutorial cover the four patterns for providing network security, of which the familiar three are cryptographic  ...  This article is a concise tutorial on the large subject of networks and security, written for all those interested in networking, whether their specialty is security or not.  ...  Pink parts of a packet are encrypted, while gray parts are authenticated. Figure 11 : 11 Summary of protocol properties.  ... 
arXiv:1912.13371v2 fatcat:qfhdtj2pi5cmjk67h2gq53vzem
« Previous Showing results 1 — 15 out of 92,317 results