Peking University

Displaying 1-33 of 33 results

  • White Papers // Mar 2012

    Adaptive Key Protection in Complex Cryptosystems With Attributes

    In the Attribute-Based Encryption (ABE) model, attributes (as opposed to identities) are used to encrypt messages, and all the receivers with qualifying attributes can decrypt the ciphertext. However, compromised attribute keys may affect the communications of many users who share the same access control policies. The authors present the notion...

    Provided By Peking University

  • White Papers // Jan 2012

    Towards Temporal Access Control in Cloud Computing

    Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integrate data access policies within the encrypted data. However, little work has been done to explore temporal attributes in specifying and enforcing the data owner's...

    Provided By Peking University

  • White Papers // Nov 2011

    Non-Cooperative Feedback Rate Control Game for Channel State Information in Wireless Networks

    It has been well recognized that Channel State Information (CSI) feedback is of great importance for downlink transmissions of closed-loop wireless networks. However, the existing work typically researched the CSI feedback problem for each individual Mobile Station (MS), and thus, cannot efficiently model the interactions among self-interested mobile users in...

    Provided By Peking University

  • White Papers // Oct 2011

    A Novel MLT-Based ETF-OFDM System for Anti-Jamming Communications

    Previous research has shown that the Expanded Time-Frequency OFDM (ETF-OFDM) system has good performance in anti-jamming communication. In this paper, a novel Lapped transform-based ETF- OFDM system is proposed with respect to the wide-band anti-jamming communication. The OFDM modulation/demodulation of the proposed system is accomplished by using Inverse Modulated Lapped...

    Provided By Peking University

  • White Papers // Oct 2011

    Vulnerability Analysis Approach To Capturing Information System Safety Threats and Requirements

    Abuse case has great support in identifying security threats and security requirements caused by outside attackers, but it has not been used to capture non-malicious deliberate acts for safety concerns that involves inside abusers. It is important to represent inside abusers in a model and distinguish them from inside intruders...

    Provided By Peking University

  • White Papers // Sep 2011

    CMCD: Count Matrix Based Code Clone Detection

    This paper introduces CMCD, a Count Matrix based technique to detect clones in program code. The key concept behind CMCD is Count Matrix, which is created while counting the occurrence frequencies of every variable in situations specified by pre-determined counting conditions. Because the characteristics of the count matrix do not...

    Provided By Peking University

  • White Papers // Sep 2011

    Iterative Mining of Resource-Releasing Specifications

    Software systems commonly use resources such as network connections or external file handles. Once finish using the resources, the software systems must release these resources by explicitly calling specific resource-releasing API methods. Failing to release resources properly could result in resource leaks or even outright system failures. Existing verification techniques...

    Provided By Peking University

  • White Papers // Aug 2011

    Collaborative Integrity Verification in Hybrid Clouds

    A hybrid cloud is a cloud computing environment in which an organization provides and manages some internal resources and the others provided externally. However, this new environment could bring irretrievable losses to the clients due to lack of integrity verification mechanism for distributed data outsourcing. In this paper, the authors...

    Provided By Peking University

  • White Papers // Jul 2011

    CloudTracker: Tracking Cloud Services for Accelerating Peer-to-Peer Content Distribution

    Large-scale content distribution on today's Internet primarily operates in two modes: cloud-based content distribution, which relies on "Cloud servers" (e.g., servers in data centers or web hosting farms, or conventional web servers) that are located closer to the "Core" Internet (i.e., within the cloud); peer-to-peer content distribution that relies on...

    Provided By Peking University

  • White Papers // Apr 2011

    Simulating Human Saccadic Scanpaths on Natural Images

    Human saccade is a dynamic process of information pursuit. Based on the principle of information maximization, the authors propose a computational model to simulate human saccadic scanpaths on natural images. The model integrates three related factors as driven forces to guide eye movements sequentially - reference sensory responses, fovea periphery...

    Provided By Peking University

  • White Papers // Dec 2010

    Distributed and Optimal Reduced Primal-Dual Algorithm for Uplink OFDM Resource Allocation

    Orthogonal Frequency Division Multiplexing (OFDM) is the key component of many emerging broadband wireless access standards. The resource allocation in OFDM uplink, however, is challenging due to heterogeneity of users' Quality of Service requirements, channel conditions, and individual resource constraints. The authors formulate the resource allocation problem as a non-strictly...

    Provided By Peking University

  • White Papers // Dec 2010

    Bisimulations for Fuzzy Transition Systems

    There has been a long history of using fuzzy language equivalence to compare the behavior of fuzzy systems, but the comparison at this level is too coarse. Recently, a finer behavioral measure, bisimulation, has been introduced to fuzzy finite automata. However, the results obtained are applicable only to finite-state systems....

    Provided By Peking University

  • White Papers // Nov 2010

    Context-Aware Usage Control for Android

    The security of smart phones is increasingly important due to their rapid popularity. Mobile computing on smart phones introduces many new characteristics such as personalization, mobility, pay-for-service and limited resources. These features require additional privacy protection and resource usage constraints in addition to the security and privacy concerns on traditional...

    Provided By Peking University

  • White Papers // Nov 2010

    Practical Property-Based Attestation on Free Software

    Existing attestation schemes still tie the property with binary code of program and they have to hold a large number of known-good measurements. However, free software is usually configured and optimized by end user and it is impossible for existing schemes to attest the customized free software of unpredictable versions....

    Provided By Peking University

  • White Papers // Nov 2010

    Remote Attestation on Function Execution

    In this paper, the authors propose a function attestation scheme, which allows a challenger to verify the execution of the mission critical functions within a program. Compared with prior work on TCG integrity attestation (efficient but ineffective) and program attestation (effective but inefficient), their scheme strikes the balance between efficiency...

    Provided By Peking University

  • White Papers // Nov 2010

    Modeling TCG-Based Secure Systems With Colored Petri Nets

    With the rapid progresses in trusted computing related research and application, many trusted computing based security mechanisms have been proposed to defend against threats in open, dynamic and distributed environments. These mechanisms are supposed to serve as the security foundations in the underlying systems. However, the correctness of these security...

    Provided By Peking University

  • White Papers // Nov 2010

    Stability-Optimal Grouping Strategy of Peer-to-Peer Systems

    When applied in high-churn Internet environments, P2P systems face a dilemma: although most participants are too unstable, a P2P system requires sufficient stable peers to provide satisfactory core services. Thus, determining how to leverage unstable nodes seems to be the only choice. The authors' primary idea is to group unstable...

    Provided By Peking University

  • White Papers // Sep 2010

    AirNotes: A Location-Aware Application in SaaS Pattern

    Software as a Service (SaaS) has been considered very attractive to business users, especially Small and Medium Enterprises (SMEs). Most SaaS applications available are traditional enterprises applications. This paper studies a new type of application, location aware application, in SaaS pattern. Unlike business application, it involves a network of location...

    Provided By Peking University

  • White Papers // Sep 2010

    New Construction of Identity-Based Proxy Re-Encryption

    A Proxy Re-Encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the proxy to translate a ciphertext encrypted under Alice's public key into one that can be decrypted by Bob's secret key. The authors present a general method to construct an identity-based proxy re-encryption scheme from...

    Provided By Peking University

  • White Papers // Sep 2010

    A Collaborative Framework for Privacy Protection in Online Social Networks

    With the wide use of Online Social Networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN leverages a key management technique to enable a user to simply post encrypted contents so that...

    Provided By Peking University

  • White Papers // Aug 2010

    Test Generation Via Dynamic Symbolic Execution for Mutation Testing

    Mutation testing has been used to assess and improve the quality of test inputs. Generating test inputs to achieve high mutant-killing ratios is important in mutation testing. However, existing test-generation techniques do not provide effective support for killing mutants in mutation testing. In this paper, the authors propose a general...

    Provided By Peking University

  • White Papers // Jun 2010

    On the Privacy of Peer-Assisted Distribution of Security Patches

    When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distribution of patches may not scale well, Peer-To-Peer (P2P) approaches have recently been suggested. There is, however, a serious privacy problem with peer-assisted...

    Provided By Peking University

  • White Papers // Jun 2010

    Responsible Investment: A Vehicle For Environmentally Sustainable Economic Growth In South Africa

    This paper explores whether any investment products or strategies in South Africa take environmental sustainability into account. By looking at how Environmental, Social, and Governance (ESG) criteria are used in investment decision making, the authors found that most socially-responsible investment products and responsible investment strategies largely focus on infrastructure, development,...

    Provided By Peking University

  • White Papers // Apr 2010

    Elastic Stream Cloud (ESC): A Stream-Oriented Cloud Computing Implementation for Rich Internet Application

    Recently, a number of cloud computing paradigms have been proposed. The new term of cloud computing is not a new concept, is a long-held dream of computing as a utility. From the view of data-centers, the common understanding of the cloud computing concept is Software as a Service (SaaS), utility...

    Provided By Peking University

  • White Papers // Mar 2010

    AmazingStore: Available, Low-Cost Online Storage Service Using Cloudlets

    Cloud-Based Internet services rely on the availability and reliability of managed data centers. Recent events indicate that data centers tend to create centralized points of failure, and providing resilience to large-scale faults remains a significant challenge for both providers and users of cloud infrastructures. A running data center also incurs...

    Provided By Peking University

  • White Papers // Jan 2010

    Improving the Performance of Hypervisor-Based Fault Tolerance

    Hypervisor-Based Fault Tolerance (HBFT), a checkpoint-recovery mechanism, is an emerging approach to sustaining mission-critical applications. Based on virtualization technology, HBFT provides an economic and transparent solution. However, the advantages currently come at the cost of substantial overhead during failure-free, especially for memory intensive applications. This paper presents an in-depth examination...

    Provided By Peking University

  • White Papers // Nov 2009

    Financial Leverage And Market Volatility With Diverse Beliefs

    The authors develop a model of asset trading with financial leverage in an economy with a continuum of investors. The investors are assumed to have diverse and rational beliefs in the sense of being compatible with observed data. They show that an increase in leverage ratio may cause the stock...

    Provided By Peking University

  • White Papers // Aug 2009

    Exports, Productivity, And Credit Constraints: A Firm-Level Empirical Investigation Of China

    Recent Melitz-type (2003) intra-industry heterogonous trade models argue that a firm's productivity has significant effects on the firm's exports. This paper examines how a firm's credit constraints as well as its productivity affect its export decisions. The authors imbed the firm's credit constraints into a Melitz-type general-equilibrium model by endogenizing...

    Provided By Peking University

  • White Papers // Jul 2009

    Exploring the Cost-Availability Tradeoff in P2P Storage Systems

    P2P storage systems use replication to provide a certain level of availability. While the system must generate new replicas to replace replicas lost to permanent failures, it can save significant replication cost by not replicating following transient failures. However, in real systems, it is impossible to reliably distinguish permanent and...

    Provided By Peking University

  • White Papers // Jun 2009

    Cross Layer Optimization for Fairness Balancing Based on Adaptively Weighted Utility Functions in OFDMA Systems

    Cross layer optimization based on utility functions has been recently studied extensively; meanwhile, numerous types of utility functions have been examined in the corresponding literature. However, a major drawback is that most utility functions take a fixed mathematical form or are based on simple combining, which cannot fully exploit available...

    Provided By Peking University

  • White Papers // Feb 2009

    Locating Need-to-Translate Constant Strings for Software Internationalization

    Modern software applications require internationalization to be distributed to different regions of the world. In various situations, many software applications are not internationalized at early stages of development. To internationalize such an existing application, developers need to externalize some hard-coded constant strings to resource files, so that translators can easily...

    Provided By Peking University

  • White Papers // Feb 2009

    TranStrL: An Automatic Need-to-Translate String Locator for Software Internationalization

    Software internationalization is often necessary when distributing software applications to different regions around the world. In many cases, developers often do not internationalize a software application at the beginning of the development stage. To internationalize such an existing application, developers need to externalize some hardcoded constant strings to resource files,...

    Provided By Peking University

  • White Papers // Nov 2008

    Active Learning of Causal Networks With Intervention Experiments and Optimal Designs

    The causal discovery from data is important for various scientific investigations. Because the authors cannot distinguish the different Directed Acyclic Graphs (DAGs) in a Markov equivalence class learned from observational data, they have to collect further information on causal structures from experiments with external interventions. In this paper, the authors...

    Provided By Peking University

  • White Papers // Nov 2011

    Non-Cooperative Feedback Rate Control Game for Channel State Information in Wireless Networks

    It has been well recognized that Channel State Information (CSI) feedback is of great importance for downlink transmissions of closed-loop wireless networks. However, the existing work typically researched the CSI feedback problem for each individual Mobile Station (MS), and thus, cannot efficiently model the interactions among self-interested mobile users in...

    Provided By Peking University

  • White Papers // Nov 2010

    Modeling TCG-Based Secure Systems With Colored Petri Nets

    With the rapid progresses in trusted computing related research and application, many trusted computing based security mechanisms have been proposed to defend against threats in open, dynamic and distributed environments. These mechanisms are supposed to serve as the security foundations in the underlying systems. However, the correctness of these security...

    Provided By Peking University

  • White Papers // Nov 2010

    Context-Aware Usage Control for Android

    The security of smart phones is increasingly important due to their rapid popularity. Mobile computing on smart phones introduces many new characteristics such as personalization, mobility, pay-for-service and limited resources. These features require additional privacy protection and resource usage constraints in addition to the security and privacy concerns on traditional...

    Provided By Peking University

  • White Papers // Nov 2010

    Practical Property-Based Attestation on Free Software

    Existing attestation schemes still tie the property with binary code of program and they have to hold a large number of known-good measurements. However, free software is usually configured and optimized by end user and it is impossible for existing schemes to attest the customized free software of unpredictable versions....

    Provided By Peking University

  • White Papers // Nov 2010

    Remote Attestation on Function Execution

    In this paper, the authors propose a function attestation scheme, which allows a challenger to verify the execution of the mission critical functions within a program. Compared with prior work on TCG integrity attestation (efficient but ineffective) and program attestation (effective but inefficient), their scheme strikes the balance between efficiency...

    Provided By Peking University

  • White Papers // Sep 2011

    CMCD: Count Matrix Based Code Clone Detection

    This paper introduces CMCD, a Count Matrix based technique to detect clones in program code. The key concept behind CMCD is Count Matrix, which is created while counting the occurrence frequencies of every variable in situations specified by pre-determined counting conditions. Because the characteristics of the count matrix do not...

    Provided By Peking University

  • White Papers // Jan 2012

    Towards Temporal Access Control in Cloud Computing

    Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integrate data access policies within the encrypted data. However, little work has been done to explore temporal attributes in specifying and enforcing the data owner's...

    Provided By Peking University

  • White Papers // Aug 2011

    Collaborative Integrity Verification in Hybrid Clouds

    A hybrid cloud is a cloud computing environment in which an organization provides and manages some internal resources and the others provided externally. However, this new environment could bring irretrievable losses to the clients due to lack of integrity verification mechanism for distributed data outsourcing. In this paper, the authors...

    Provided By Peking University

  • White Papers // Mar 2010

    AmazingStore: Available, Low-Cost Online Storage Service Using Cloudlets

    Cloud-Based Internet services rely on the availability and reliability of managed data centers. Recent events indicate that data centers tend to create centralized points of failure, and providing resilience to large-scale faults remains a significant challenge for both providers and users of cloud infrastructures. A running data center also incurs...

    Provided By Peking University

  • White Papers // Aug 2010

    Test Generation Via Dynamic Symbolic Execution for Mutation Testing

    Mutation testing has been used to assess and improve the quality of test inputs. Generating test inputs to achieve high mutant-killing ratios is important in mutation testing. However, existing test-generation techniques do not provide effective support for killing mutants in mutation testing. In this paper, the authors propose a general...

    Provided By Peking University

  • White Papers // Jun 2009

    Cross Layer Optimization for Fairness Balancing Based on Adaptively Weighted Utility Functions in OFDMA Systems

    Cross layer optimization based on utility functions has been recently studied extensively; meanwhile, numerous types of utility functions have been examined in the corresponding literature. However, a major drawback is that most utility functions take a fixed mathematical form or are based on simple combining, which cannot fully exploit available...

    Provided By Peking University

  • White Papers // Jun 2010

    On the Privacy of Peer-Assisted Distribution of Security Patches

    When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distribution of patches may not scale well, Peer-To-Peer (P2P) approaches have recently been suggested. There is, however, a serious privacy problem with peer-assisted...

    Provided By Peking University

  • White Papers // Aug 2009

    Exports, Productivity, And Credit Constraints: A Firm-Level Empirical Investigation Of China

    Recent Melitz-type (2003) intra-industry heterogonous trade models argue that a firm's productivity has significant effects on the firm's exports. This paper examines how a firm's credit constraints as well as its productivity affect its export decisions. The authors imbed the firm's credit constraints into a Melitz-type general-equilibrium model by endogenizing...

    Provided By Peking University

  • White Papers // Sep 2010

    A Collaborative Framework for Privacy Protection in Online Social Networks

    With the wide use of Online Social Networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN leverages a key management technique to enable a user to simply post encrypted contents so that...

    Provided By Peking University

  • White Papers // Dec 2010

    Distributed and Optimal Reduced Primal-Dual Algorithm for Uplink OFDM Resource Allocation

    Orthogonal Frequency Division Multiplexing (OFDM) is the key component of many emerging broadband wireless access standards. The resource allocation in OFDM uplink, however, is challenging due to heterogeneity of users' Quality of Service requirements, channel conditions, and individual resource constraints. The authors formulate the resource allocation problem as a non-strictly...

    Provided By Peking University

  • White Papers // Sep 2010

    New Construction of Identity-Based Proxy Re-Encryption

    A Proxy Re-Encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the proxy to translate a ciphertext encrypted under Alice's public key into one that can be decrypted by Bob's secret key. The authors present a general method to construct an identity-based proxy re-encryption scheme from...

    Provided By Peking University

  • White Papers // Nov 2008

    Active Learning of Causal Networks With Intervention Experiments and Optimal Designs

    The causal discovery from data is important for various scientific investigations. Because the authors cannot distinguish the different Directed Acyclic Graphs (DAGs) in a Markov equivalence class learned from observational data, they have to collect further information on causal structures from experiments with external interventions. In this paper, the authors...

    Provided By Peking University

  • White Papers // Dec 2010

    Bisimulations for Fuzzy Transition Systems

    There has been a long history of using fuzzy language equivalence to compare the behavior of fuzzy systems, but the comparison at this level is too coarse. Recently, a finer behavioral measure, bisimulation, has been introduced to fuzzy finite automata. However, the results obtained are applicable only to finite-state systems....

    Provided By Peking University

  • White Papers // Apr 2011

    Simulating Human Saccadic Scanpaths on Natural Images

    Human saccade is a dynamic process of information pursuit. Based on the principle of information maximization, the authors propose a computational model to simulate human saccadic scanpaths on natural images. The model integrates three related factors as driven forces to guide eye movements sequentially - reference sensory responses, fovea periphery...

    Provided By Peking University

  • White Papers // Feb 2009

    TranStrL: An Automatic Need-to-Translate String Locator for Software Internationalization

    Software internationalization is often necessary when distributing software applications to different regions around the world. In many cases, developers often do not internationalize a software application at the beginning of the development stage. To internationalize such an existing application, developers need to externalize some hardcoded constant strings to resource files,...

    Provided By Peking University

  • White Papers // Feb 2009

    Locating Need-to-Translate Constant Strings for Software Internationalization

    Modern software applications require internationalization to be distributed to different regions of the world. In various situations, many software applications are not internationalized at early stages of development. To internationalize such an existing application, developers need to externalize some hard-coded constant strings to resource files, so that translators can easily...

    Provided By Peking University

  • White Papers // Nov 2010

    Stability-Optimal Grouping Strategy of Peer-to-Peer Systems

    When applied in high-churn Internet environments, P2P systems face a dilemma: although most participants are too unstable, a P2P system requires sufficient stable peers to provide satisfactory core services. Thus, determining how to leverage unstable nodes seems to be the only choice. The authors' primary idea is to group unstable...

    Provided By Peking University

  • White Papers // Nov 2009

    Financial Leverage And Market Volatility With Diverse Beliefs

    The authors develop a model of asset trading with financial leverage in an economy with a continuum of investors. The investors are assumed to have diverse and rational beliefs in the sense of being compatible with observed data. They show that an increase in leverage ratio may cause the stock...

    Provided By Peking University

  • White Papers // Jun 2010

    Responsible Investment: A Vehicle For Environmentally Sustainable Economic Growth In South Africa

    This paper explores whether any investment products or strategies in South Africa take environmental sustainability into account. By looking at how Environmental, Social, and Governance (ESG) criteria are used in investment decision making, the authors found that most socially-responsible investment products and responsible investment strategies largely focus on infrastructure, development,...

    Provided By Peking University

  • White Papers // Jul 2011

    CloudTracker: Tracking Cloud Services for Accelerating Peer-to-Peer Content Distribution

    Large-scale content distribution on today's Internet primarily operates in two modes: cloud-based content distribution, which relies on "Cloud servers" (e.g., servers in data centers or web hosting farms, or conventional web servers) that are located closer to the "Core" Internet (i.e., within the cloud); peer-to-peer content distribution that relies on...

    Provided By Peking University

  • White Papers // Sep 2010

    AirNotes: A Location-Aware Application in SaaS Pattern

    Software as a Service (SaaS) has been considered very attractive to business users, especially Small and Medium Enterprises (SMEs). Most SaaS applications available are traditional enterprises applications. This paper studies a new type of application, location aware application, in SaaS pattern. Unlike business application, it involves a network of location...

    Provided By Peking University

  • White Papers // Oct 2011

    A Novel MLT-Based ETF-OFDM System for Anti-Jamming Communications

    Previous research has shown that the Expanded Time-Frequency OFDM (ETF-OFDM) system has good performance in anti-jamming communication. In this paper, a novel Lapped transform-based ETF- OFDM system is proposed with respect to the wide-band anti-jamming communication. The OFDM modulation/demodulation of the proposed system is accomplished by using Inverse Modulated Lapped...

    Provided By Peking University

  • White Papers // Apr 2010

    Elastic Stream Cloud (ESC): A Stream-Oriented Cloud Computing Implementation for Rich Internet Application

    Recently, a number of cloud computing paradigms have been proposed. The new term of cloud computing is not a new concept, is a long-held dream of computing as a utility. From the view of data-centers, the common understanding of the cloud computing concept is Software as a Service (SaaS), utility...

    Provided By Peking University

  • White Papers // Sep 2011

    Iterative Mining of Resource-Releasing Specifications

    Software systems commonly use resources such as network connections or external file handles. Once finish using the resources, the software systems must release these resources by explicitly calling specific resource-releasing API methods. Failing to release resources properly could result in resource leaks or even outright system failures. Existing verification techniques...

    Provided By Peking University

  • White Papers // Jan 2010

    Improving the Performance of Hypervisor-Based Fault Tolerance

    Hypervisor-Based Fault Tolerance (HBFT), a checkpoint-recovery mechanism, is an emerging approach to sustaining mission-critical applications. Based on virtualization technology, HBFT provides an economic and transparent solution. However, the advantages currently come at the cost of substantial overhead during failure-free, especially for memory intensive applications. This paper presents an in-depth examination...

    Provided By Peking University

  • White Papers // Jul 2009

    Exploring the Cost-Availability Tradeoff in P2P Storage Systems

    P2P storage systems use replication to provide a certain level of availability. While the system must generate new replicas to replace replicas lost to permanent failures, it can save significant replication cost by not replicating following transient failures. However, in real systems, it is impossible to reliably distinguish permanent and...

    Provided By Peking University

  • White Papers // Mar 2012

    Adaptive Key Protection in Complex Cryptosystems With Attributes

    In the Attribute-Based Encryption (ABE) model, attributes (as opposed to identities) are used to encrypt messages, and all the receivers with qualifying attributes can decrypt the ciphertext. However, compromised attribute keys may affect the communications of many users who share the same access control policies. The authors present the notion...

    Provided By Peking University

  • White Papers // Oct 2011

    Vulnerability Analysis Approach To Capturing Information System Safety Threats and Requirements

    Abuse case has great support in identifying security threats and security requirements caused by outside attackers, but it has not been used to capture non-malicious deliberate acts for safety concerns that involves inside abusers. It is important to represent inside abusers in a model and distinguish them from inside intruders...

    Provided By Peking University