Design-Efficiency in Security

نویسندگان

  • Ender Yüksel
  • Hanne Riis Nielson
  • Flemming Nielson
چکیده

In this document, we present our applied results on balancing security and performance using a running example, which is based on sensor networks. These results are forming a basis for a new approach to balance security and performance, and therefore provide design-efficiency of key updates. We employ probabilistic model checking approach and present our modelling and analysis study using PRISM model checker.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Design for Process Security

Chemical process security has been an area of interest due to the potential of process industries as a possible terrorism target. As a result, model-based process security analysis methods that try to detect process vulnerabilities in a fundamental way have been proposed. The design aspect of the problem, however, has not been addressed yet. In this work, an adverse-MPC approach, which enables ...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

Exploring the role of architectural design in creating a sense of security and residential satisfaction in affordable residential complexes for young Iranian low-income families

The most important requirement of the family after food and clothing is housing. It also plays an important role in providing safety and security etc. for the family. Security is important therefore it is placed among other human physiological needs like food, shelter and sanitation. Security feeling is one of the main factorsin stability of urban spaces. It can be said that secure enviro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1302.1111  شماره 

صفحات  -

تاریخ انتشار 2013