Sciweavers

3193 search results - page 109 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ICSE
2000
IEEE-ACM
14 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
FLAIRS
2000
13 years 11 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
14 years 4 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
CCS
2011
ACM
12 years 10 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
ISMIR
2005
Springer
176views Music» more  ISMIR 2005»
14 years 3 months ago
On the Modeling of Time Information for Automatic Genre Recognition Systems in Audio Signals
The creation of huge databases coming from both restoration of existing analogue archives and new content is demanding fast and more and more reliable tools for content analysis a...
Nicolas Scaringella, Giorgio Zoia