Collaborative detection of DDoS attacks over multiple network domains

Y Chen, K Hwang, WS Ku - IEEE Transactions on parallel and …, 2007 - ieeexplore.ieee.org
This paper presents a new distributed approach to detecting DDoS (distributed denial of
services) flooding attacks at the traffic-flow level The new defense system is suitable for …

Digital identity

ESF Loughlin-mchugh, RE Szczesniak - US Patent 9,785,764, 2017 - Google Patents
The disclosure relates to a method of authenticating a digital credential of a bearer by a
validating device, the method including capturing the bearer credential by the validating …

Using models at runtime to address assurance for self-adaptive systems

BHC Cheng, KI Eder, M Gogolla, L Grunske… - Models@ run. time …, 2014 - Springer
A self-adaptive software system modifies its behavior at runtime in response to changes
within the system or in its execution environment. The fulfillment of the system requirements …

Feature-oriented programming and the AHEAD tool suite

D Batory - Proceedings. 26th International Conference on …, 2004 - ieeexplore.ieee.org
Feature oriented programming (FOP) is an emerging paradigm for application synthesis,
analysis, and optimization. A target application is specified declaratively as a set of features …

A survey of approaches to adaptive application security

A Elkhodary, J Whittle - International Workshop on Software …, 2007 - ieeexplore.ieee.org
Adaptive systems dynamically change their behavior or structure at runtime to respond to
environmental changes. This paper considers one class of adaptive systems-those that …

A learning-based framework for engineering feature-oriented self-adaptive software systems

N Esfahani, A Elkhodary, S Malek - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Self-adaptive software systems are capable of adjusting their behavior at runtime to achieve
certain functional or quality-of-service goals. Often a representation that reflects the internal …

A privacy-aware access control system

CA Ardagna, M Cremonini… - Journal of …, 2008 - content.iospress.com
The protection of privacy is an increasing concern in our networked society because of the
growing amount of personal information that is being collected by a number of commercial …

Dice: Quality-driven development of data-intensive cloud applications

G Casale, D Ardagna, M Artac, F Barbier… - 2015 IEEE/ACM 7th …, 2015 - ieeexplore.ieee.org
Model-driven engineering (MDE) often features quality assurance (QA) techniques to help
developers creating software that meets reliability, efficiency, and safety requirements. In this …

Comparison of adaptive information security approaches

A Evesti, E Ovaska - International Scholarly Research Notices, 2013 - Wiley Online Library
Dynamically changing environments and threat landscapes require adaptive information
security. Adaptive information security makes it possible to change and modify security …

Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project

CA Ardagna, J Camenisch… - Journal of …, 2010 - content.iospress.com
We conduct more and more of our daily interactions over electronic media. The EC-funded
project PRIME (Privacy and Identity Management for Europe) envisions that individuals will …