نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

Journal: :CoRR 2001
Dennis Guster Nikolai K. Krivulin

A model of computer system security operation is developed based on the fork-join queueing network formalism. We introduce a security operation performance measure, and show how it may be used to performance evaluation of actual systems. Key-Words: computer system security, security attack, security vulnerability, performance evaluation, fork-join queueing networks.

2004
William H. Sanders

Stochastic methods are commonly used for dependability evaluation. In the mid 1970’s, stochastic evaluation was proposed for combined performance/dependability evaluation, called performability evaluation. Extending reliability evaluation to include performance related behaviors presented new challenges, most notably due to the large difference in time scale of performanceand dependability-rela...

Journal: :Frontiers of Agricultural Science and Engineering 2020

2006
Huiyun Li

Consumer security devices are becoming ubiquitous, from pay-TV through mobile phones, PDA, prepayment gas meters to smart cards. There are many ongoing research efforts to keep these devices secure from opponents who try to retrieve key information by observation or manipulation of the chip’s components. In common industrial practise, it is after the chip has been manufactured that security eva...

Journal: :JSW 2013
Lixia Xie Yanxin Yan Jiyong Zhang

According to the problem in communication protocol security assessments, a new protocol security comprehensive evaluation method based on the threedimensional sphere model is presented. In this method, a three-dimensional security evaluation index system was built through positions of index on the external of spherical shell. Evaluation index weights of the top two levels were obtained through ...

2014
Igor Kotenko Andrey Chechulin

The paper suggests an approach to network attack modeling and security evaluation which is realized in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of computer network and malefactors’ behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security metrics and providing...

2010
Huiyun Li Keke Wu Fengqi Yu Hai Yuan

Physical non-invasive security has become crucial for cryptographic modules, which are widely used in pervasive computing. International security evaluation standards, such as U.S. Federal Information Processing Standard (FIPS) 140-3 and Common Criteria (CC) part 3 have added special requirements addressing physical non-invasive security. However, these evaluation standards lack of quantitative...

2013
Hidema Tanaka

We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum communication. Confidential modulationrealizes a secret communication by using secret information for modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication. The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical ...

Journal: :Computers & Security 2001
Gurpreet Dhillon

A majority of computer security breaches occur because internal employees of an organization subvert existing controls. While exploring the issue of violation of safeguards by trusted personnel, with specific reference to Barings Bank and the activities of Nicholas Leeson, this paper provides an understanding of related information security concerns. In a final synthesis, guidelines are provide...

2016
Pritam Paul

As the conventional network security evaluation methods have prejudiced aspects when the weights of an evaluation indexes are recognized, it is not easy to make precise and objective evaluation. However, the Rough set theory has the benefits of not needing apriority information when dealing with tentative problems. Therefore, the appliance of the Rough set theory in the network security evaluat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید