نتایج جستجو برای: security model
تعداد نتایج: 2246841 فیلتر نتایج به سال:
We present a model of security monitoring that distinguishes between two types of logging and auditing, and from the model draw implications for the design and use of security monitoring mechanisms. We then demonstrate the usefulness of the model by analyzing several different monitoring mechanisms.
; LOGIN : AUGUST 2010 SYMBIAN OS PLATFORM SECURITY MODEL 23 THE S YMB IAN OS B ECAME FU L LY OPEN sourced in February 2010, which opens even more possibilities for application developers to understand and analyze its security solution. We present a short introduction to the software features of Symbian platform security: three trust tiers, capability model, data caging, and the Symbian signed p...
Recently, distributed systems have become a fundamental type of computer system. Because of this, their security is essential. The research described in this document aimed to find their weaknesses and to find the means to improve them with regards to their security. To do that, we examined the security properties that a system considered secure must support. While looking for a system with whi...
In an interdependent world the risks faced by any one agent depend not only on its choices but also on those of all others. Expectations about others’ choices will influence investments in risk-management, and the outcome can be suboptimal for everyone. We model this as the Nash equilibrium of a game and give conditions for such a sub-optimal equilibrium to be tipped to an optimal one. We also ...
A model-theoretic approach can establish security theorems, which are formulas expressing authentication and non-disclosure properties of protocols. Security theorems have a special form, namely quantified implications ∀~x .(φ ⊃ ∃~y .ψ). Models (interpretations) for these formulas are skeletons, partially ordered structures consisting of a number of local protocol behaviors. Realized skeletons ...
Java language and technology [3, 4, 10] were proposed with security in mind, yet there are some limitations especially when it comes to running Java applications in a distributed context. In this work we propose a new security policy together with the relevant verification mechanisms. This model is aimed at controlling the access to the system resources in a trustable and flexible way. This mod...
Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be weighed against the very real security threats they pose. These threats originate not just in malicious agents but in malicious hosts as well.1 For example, if there is no mechanism to prevent attacks, a host can implant its own tasks into an agent or modify the agent’s state. This can lead in t...
Success of any software system largely looms upon its vigilance efficiency that prompts organizations to meet the set of objectives in the arena of networks. In the highly competitive world, everything appears to be vulnerable; information system is also not an exception to this fact. The security of information system has become a cause of great concern. On the contrary, till time the software...
As a long-term industrial initiative, we are developing a new method to support security risk analysis, closely integrated with the overall engineering process of our critical information systems. This method is building upon model-based engineering techniques. This paper presents a prototype domainspecific modelling language (DSML) that was developed in this context; this DSML aims at supporti...
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید