Jungles

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 26286 Experts worldwide ranked by ideXlab platform

Lisa Kaati - One of the best experts on this subject based on the ideXlab platform.

  • analyzing the security in the gsm radio network using attack Jungles
    Leveraging Applications of Formal Methods, 2010
    Co-Authors: Parosh Aziz Abdulla, Jonathan Cederberg, Lisa Kaati
    Abstract:

    In this paper we introduce the concept of attack Jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack Jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack Jungles. The tool was used to analyze the security of the GSM (radio) access network.

  • ISoLA (1) - Analyzing the security in the GSM radio network using attack Jungles
    Lecture Notes in Computer Science, 2010
    Co-Authors: Parosh Aziz Abdulla, Jonathan Cederberg, Lisa Kaati
    Abstract:

    In this paper we introduce the concept of attack Jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack Jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack Jungles. The tool was used to analyze the security of the GSM (radio) access network.

Maria Gloria Dominguez-bello - One of the best experts on this subject based on the ideXlab platform.

  • A Microbial Anthropologist in the Jungle.
    Cell, 2016
    Co-Authors: Maria Gloria Dominguez-bello
    Abstract:

    Finally, we approach the port after days sitting on the narrow bench of the canoe, watching walls of vegetation bending over the rivers that zigzag the jungle, guarded by taller trees behind, with their skirt of shade. The scene is similarly beautifully dynamic under the changing light of the day, in the Jungles of Venezuela or Peru. We recognize the canoe port, and the trail leading up to the village. It’s the end of this leg of the journey and the beginning of the work we have come to do. The first kids come down naked, running toward us, alerted by our motor.

Parosh Aziz Abdulla - One of the best experts on this subject based on the ideXlab platform.

  • analyzing the security in the gsm radio network using attack Jungles
    Leveraging Applications of Formal Methods, 2010
    Co-Authors: Parosh Aziz Abdulla, Jonathan Cederberg, Lisa Kaati
    Abstract:

    In this paper we introduce the concept of attack Jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack Jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack Jungles. The tool was used to analyze the security of the GSM (radio) access network.

  • ISoLA (1) - Analyzing the security in the GSM radio network using attack Jungles
    Lecture Notes in Computer Science, 2010
    Co-Authors: Parosh Aziz Abdulla, Jonathan Cederberg, Lisa Kaati
    Abstract:

    In this paper we introduce the concept of attack Jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker successfully can achieve his goal. Attack Jungles are an extension of attack trees [13] that allows multiple roots, cycles and reusability of resources. We have implemented a prototype tool for constructing and analyzing attack Jungles. The tool was used to analyze the security of the GSM (radio) access network.

Ariel Rubinstein - One of the best experts on this subject based on the ideXlab platform.

  • 3. The Jungle Tale and the Market Tale
    2012
    Co-Authors: Ariel Rubinstein
    Abstract:

    An exercise in rhetoric This chapter summarizes the very first lectures in two Introductory Economics courses. One lecture is from the Introduction to the Jungle Economy course. This is a unique course that you cannot learn anywhere else. I will ask you to imagine that you are listening to it in the straw huts of Lubungulu University, located deep in the thick, dark, green jungle. The purpose of this lecture is to present the basic idea of the jungle economy. The second lecture launches the I...

  • Equilibrium in the Jungle
    The Economic Journal, 2007
    Co-Authors: Michele Piccione, Ariel Rubinstein
    Abstract:

    In the jungle, power and coercion govern the exchange of resources. We study a simple, stylised model of the jungle that mirrors an exchange economy. We define the notion of jungle equilibrium and demonstrate that a number of standard results of competitive markets hold in the jungle.

  • Two Tales of Power and Distribution of Wealth in the Jungle
    Levine's Bibliography, 2003
    Co-Authors: Michele Piccione, Ariel Rubinstein
    Abstract:

    In the jungle, power and coercion govern the exchange of resources. We study two simple, stylized models of the jungle. The first model mirrors an exchange economy. We define the notion of jungle equilibrium and demonstrate that standard results of competitive markets hold in the jungle as well. The second model is game theoretic. We show that being more powerful does not necessarily imply being wealthier. JEL Classification: C7, D4, S477

Hans-peter Weikard - One of the best experts on this subject based on the ideXlab platform.

  • Pareto efficiency in the jungle
    Review of Economic Design, 2017
    Co-Authors: Harold Houba, Roland Iwan Luttens, Hans-peter Weikard
    Abstract:

    We revisit the jungle economy of Piccione and Rubinstein (Econ J 117(July):883–896, 2007 ) in which the allocation of resources is driven by coercion. In this economy the unique equilibrium satisfies lexicographic maximization. We show that relaxing the assumptions on consumption sets and preferences slightly, allocations other than lexicographic maximizers can be jungle equilibria. We attribute this result to single unilateral taking where a stronger agent takes goods from only one weaker agent. Once multiple unilateral takings are introduced, we show that jungle equilibria coincide with lexicographic maximization under weak assumptions. However, we also present examples of equilibria that are Pareto inefficient, where voluntary gift giving by stronger agents is needed to achieve Pareto efficiency and even voluntary trade has a role in the jungle.

  • Pareto Efficiency in the Jungle
    Review of Economic Design, 2017
    Co-Authors: Harold Houba, Roland Iwan Luttens, Hans-peter Weikard
    Abstract:

    We include initial holdings in the jungle economy of Piccione and Rubinstein (Economic Journal, 2007) in which the unique equilibrium satisfies lexicographic welfare maximization. When we relax assumptions on consumption sets and preferences slightly, equilibria other than lexicographic welfare maximizers can be jungle equilibria. This result is due to myopia. We introduce the concept of farsightedness and show that farsighted jungle equilibria coincide with lexicographic welfare maximization. However, we also find farsighted equilibria that are Pareto inefficient since stronger agents may withhold goods from weaker agents. Here, gift giving by stronger agents is needed to achieve Pareto efficiency. We argue that even trade has a role in the jungle. Our results add to understanding coercion and the subtle role of gift giving and trade in an economy purely based on po wer relations.