1,351 Hits in 3.9 sec

Planning Attacks to Security Protocols: Case Studies in Logic Programming [chapter]

Luigia Carlucci Aiello, Fabio Massacci
2002 Lecture Notes in Computer Science  
model finders (e.g. the smodels systems by Niemela and his group).  ...  Formal verification of security protocols has become a key issue in computer security. Yet, it has proven to be a hard task often error prone and discouraging for non-experts in formal methods.  ...  This work is partly supported by ASI, CNR, and MURST grants. F. Massacci acknowledges the support of a CNR Short Term Mobility fellowship and the CNR-201-15-9 fellowship.  ... 
doi:10.1007/3-540-45628-7_20 fatcat:ktsqgkacircqjcbx432g3o5zni

Approaches to Formal Verification of Security Protocols [article]

Suvansh Lal, Mohit Jain, Vikrant Chaplot
2011 arXiv   pre-print
Thus, formal verification of security protocols has become a key issue in computer and communications security.  ...  In this paper we present, analyze and compare some prevalent approaches towards verification of secure systems.  ...  Therefore through this paper, we intend to present, compare and analyze a few most prevalent approaches towards formal verification of security protocols.  ... 
arXiv:1101.1815v1 fatcat:3maqpqmqlvdjdgzsinpzsxpcnu

UCTx: A Multi-Agent System to Assist a Transplant Coordination Unit

U. Cortés, J. Vázquez-Salceda, A. López-Navidad, F. Caballero
2004 Applied intelligence (Boston)  
The aim of this work is to show how a multi-agent approach allows us to describe and implement the model, and how UCTx is capable of dealing with another multi-agent system (Carrel, an Agent Mediated Institution  ...  We present a system called UCTx designed to model and automate some of the tasks performed by a Transplant Coordination Unit (UCTx) inside a Hospital.  ...  Acknowledgments We acknowledge the implementation efforts of Jorge Castillo (Carrel1), Jordi Anglí (Carrel2) and Marc Font (Carrel3). We would like to thank Dr.  ... 
doi:10.1023/b:apin.0000011142.91514.57 fatcat:cf4wtu5alnb4rhtvh7fiyc3ds4

On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations

Trajce Dimkov, Qiang Tang, Pieter H. Hartel
2008 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
We show that none of the current security models simultaneously considers the data mobility and organizational dynamics to a satisfactory extent.  ...  As a result, none of the current security models effectively identifies the potential security threats caused by data mobility in a dynamic organization.  ...  Acknowledgements We thank Roel Wieringa, Siv Hilde Houmb, and André van Cleeff for their help with the paper.  ... 
dblp:conf/models/DimkovTH08 fatcat:wxjjniqgs5bdfa2auta3k7kj6u

Formalizing an electronic institution for the distribution of human tissues

J. Vázquez-Salceda, J.A. Padget, U. Cortés, A. López-Navidad, F. Caballero
2003 Artificial Intelligence in Medicine  
an agent in a particular role and the development of trust both between (heterogeneous) agents and between users and agents.  ...  To address these issues we propose a formal normative framework, deriving from and developing the notion of an electronic institution.  ...  When a surgeon needs a piece he makes his request through the UCTx system, which analyzes the information entered by the surgeon, adds the information about the recipient and, finally, creates a Finder  ... 
doi:10.1016/s0933-3657(03)00005-8 pmid:12667738 fatcat:wobhyzvzkncihlwqsbcp2hee2e

Model-Driven Development Meets Security: An Evaluation of Current Approaches

K Kasal, J Heurix, T Neubauer
2011 2011 44th Hawaii International Conference on System Sciences  
This paper evaluates current efforts that position security as a fundamental element in model-driven development, highlights their deficiencies and identifies current research challenges.  ...  Lately, model-driven development has been proposed in order to increase the quality and thereby the security of software systems.  ...  center Secure Business Austria funded by the Federal Ministry of Economy, Family and Youth of the Republic of Austria and by the City of Vienna.  ... 
doi:10.1109/hicss.2011.310 dblp:conf/hicss/KasalHN11 fatcat:eujsqve6ovgpbagm6nmftoi7li

Tool-Supported Process Analysis and Design for the Development of Multi-agent Systems [chapter]

Holger Knublauch, Thomas Rose
2003 Lecture Notes in Computer Science  
We support creativity by means of a searchable repository of reusable agent design patterns and other types of process modeling knowledge.  ...  We support collaboration by means of a tool-supported modeling approach that allows one to capture existing and agentified processes in a format that is sufficiently simple to be understood and maintained  ...  on mobile devices.  ... 
doi:10.1007/3-540-36540-0_15 fatcat:x4rgmey3rnbq7eusgb6cpjoija

On Feature Interactions Among Web Services

Michael Weiss, Babak Esfandiari
2005 International Journal of Web Services Research  
The paper concludes with a discussion of our findings and an outlook on future research.  ...  We then describe our approach for detecting and resolving feature interactions among web services. The approach is based on goal-oriented analysis and scenario modeling.  ...  If we model performance and security as non-functional features, we can treat this trade-off as a feature interaction. Where to Draw the Line?  ... 
doi:10.4018/jwsr.2005100102 fatcat:zzbv5khuynhirfkymkiac4yfse

On feature interactions among Web services

M. Weiss, B. Esfandiari
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
The paper concludes with a discussion of our findings and an outlook on future research.  ...  We then describe our approach for detecting and resolving feature interactions among web services. The approach is based on goal-oriented analysis and scenario modeling.  ...  If we model performance and security as non-functional features, we can treat this trade-off as a feature interaction. Where to Draw the Line?  ... 
doi:10.1109/icws.2004.1314727 dblp:conf/icws/WeissE04 fatcat:ot5uysegg5f7hdpdlijogte5pm

Exploitation of Digital Artifacts and Interactions to Enable Peer-to-Peer Knowledge Management

Mark T. Maybury
2004 Peer-to-Peer Knowledge Management  
Next we describe automated tools for profiling individual and collective expertise (Expert Finder) as well as organizational knowledge interactions within a distributed enterprise to detect expert communities  ...  Finally, we discuss our efforts to create and deploy tools for peer-to-peer knowledge communication/exchange (CVW and TrIM).  ...  Peter Spellman created CVW and Rod Holland led a team to create TrIM.  ... 
dblp:conf/p2pkm/Maybury04 fatcat:sqvkteg5ozfhtos2zzf4jlzzee

Expert-Finding Systems for Organizations: Problem and Domain Analysis and the DEMOIR Approach

Dawit Yimam-Seid, Alfred Kobsa
2003 Journal of Organizational Computing and Electronic Commerce  
We first explore the expert finding problem in depth, review and analyze existing systems in this domain, and suggest a domain model that can serve as a framework for design and development decisions.  ...  Finally, we present our approach called DEMOIR, which is a modular architecture for expert finding systems that is based on a centralized expertise modeling server while also incorporating decentralized  ...  A great deal of the ideas presented in this paper benefited from the discussions with the information brokering team members Jürgen Koenemann, Christoph Thomas, Roland Klemke and Achim Nick as well as  ... 
doi:10.1207/s15327744joce1301_1 fatcat:bh3xosflzjemfpk5w6gyybo3bm

Game theory meets network security and privacy

Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
2013 ACM Computing Surveys  
This survey provides a structured and comprehensive overview of the research contributions that analyze and solve security and privacy problems in computer networks by game-theoretic approaches.  ...  A selected set of works are presented to highlight the application of game theory in order to address different forms of security and privacy problems in computer networks and mobile applications.  ...  It can be used as a rich mathematical tool to analyze and model new security problems.  ... 
doi:10.1145/2480741.2480742 fatcat:55ixmohvijaelflxqrrbtnvfuu

Invited talks

Martin A. Riedmiller, François Fages, Malik Ghallab, Wolfgang Wahlster, Jörg H. Siekmann
2004 Künstliche Intelligenz  
It covers a particularly broad spectrum of subfields in AI theory and practice. Please visit the conference Website for details about the papers selected for presentation.  ...  KI-2004 cordially invites AI researchers and practitioners and those interested in AI in general to meet in the beautiful town of Ulm on the banks of the Danube in September this year.  ...  As a scientific director of the DFKI and a professor of computer science at the Universität des Saarlandes he is the head of four research labs: multi agent systems, safety and security verification, automated  ... 
dblp:journals/ki/RiedmillerFGWS04 fatcat:cl4fqk3wdvdtljtoudzaacbsbe

Mobile hosts in enterprise service integration

Satish Narayana Srirama, Matthias Jarke
2009 International Journal of Web Engineering and Technology  
Security Analysis Performance Model To analyze the performance of the Mobile Host with the security load, the performance model of Mobile Host, explained in section 3.1.3, was extended to embrace the security  ...  Security Analysis Design Model To secure the communication of mobile web services provisioning, first the study analyzed the adaptability of WS-Security in the mobile web services domain [Srirama et al  ... 
doi:10.1504/ijwet.2009.028620 fatcat:ho2y475htrhv7hq4cjmd6cgqbi

Analyzing Cyber-Physical Threats on Robotic Platforms

Khalil Ahmad Yousef, Anas AlMajali, Salah Ghalyon, Waleed Dweik, Bassam Mohd
2018 Sensors  
A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks.  ...  .; AlMajali, A.; Hasan, R.; Dweik, W.; Mohd, B. Security risk assessment of the PeopleBot mobile robot research platform. Abstract: Robots are increasingly involved in our daily lives.  ...  Acknowledgments: We would like to acknowledge that this research was supported by a grant from the Deanship of Scientific Research at the Hashemite University, Zarqa, Jordan.  ... 
doi:10.3390/s18051643 pmid:29883403 pmcid:PMC5982649 fatcat:vyy7pbmwqfdbzifzzgja7rbqsa
« Previous Showing results 1 — 15 out of 1,351 results