Sciweavers

831 search results - page 23 / 167
» A Security Concept for OLAP
Sort
View
CCS
2006
ACM
14 years 15 days ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
ASE
2007
121views more  ASE 2007»
13 years 9 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
ISF
2007
121views more  ISF 2007»
13 years 8 months ago
Virtual organization security policies: An ontology-based integration approach
Abstract This paper addresses the specification of a security policy ontology framework to mediate security policies between virtual organizations (VO) and real organizations (RO)....
Saravanan Muthaiyah, Larry Kerschberg
ISCC
2005
IEEE
14 years 2 months ago
Virtual Machine Management for Tele-Lab "IT-Security" Server
Tele-Lab “IT-Security” Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines an...
Ji Hu, Dirk Cordel, Christoph Meinel
FUIN
2008
74views more  FUIN 2008»
13 years 8 months ago
Security in a Model for Long-running Transactions
Abstract. Communicating Hierarchical Transaction-based Timed Automata have been introduced to model systems performing long
Damas P. Gruska, Andrea Maggiolo-Schettini, Paolo ...