Deliverable No: D.WP.JRA.6.3.6 Deliverable title: Quantitative Assessment of Security
نویسندگان
چکیده
We apologize for the fact that due to some unforeseen manpower shortage at Partner 32, the conclusion of this deliverable has been significantly delayed.
منابع مشابه
Deliverable No : D . WP . JRA . 6 . 3 . 7 Deliverable title : Security considerations for Next Generation Internet
متن کامل
Acronym : QUASIMODO Deliverable no . : D 1 . 1 Title of Deliverable : Modelling Quantitative System Aspects
This deliverable describes the results of the QUASIMODO project on modelling quantitative system aspects. Keyword list: AADL, Arcade, architectural dependability evaluation, cost-bounded reachability, priced priced/weighted timed automata, probabilistic timed automata, probabilistic timed automata, probabilistic hybrid systems. ICT-FP7-STREP-214755 / QUASIMODO Page 2 of 12 Public
متن کاملD5.4 Market Survey Report Project Full Title People and Knowledge Cross Lingual Information Gathering Security (distribution Level) Public
Contractual date of delivery "M18 = June 2002" Actual date of delivery "31 of July 2002" Deliverable number D54 Deliverable name Market Survey
متن کاملProject Acronym : QUASIMODO Deliverable no . : D 2 . 1 Title of Deliverable : Model - checking of real - time probabilistic models
This deliverable describes the first year results of the QUASIMODO project on analysing quantitative systems. Keyword list: Markov chain, Markov decision process, probabilistic bisimulation, probabilistic simulations; probabilistic timed automata; priced probabilistic timed automata; Continuous Time Markov Chains, inhomogeneous CTMC, Infinite state CTMC, counter-example guided abstractionrefine...
متن کاملDeliverable no . : 3 . 1 / 2 Title of Deliverable : Information Leakage of Non - Terminating Processes
In recent years, quantitative security techniques have been providing effective measures of the security of a system against an attacker. Such techniques usually assume that the system produces a finite amount of observations based on a finite amount of secret bits and terminates, and the attack is based on these observations. By modeling systems with Markov chains, we are able to measure the e...
متن کامل