Sciweavers

187 search results - page 13 / 38
» A Semantic Approach to Secure Information Flow
Sort
View
CCS
2009
ACM
14 years 2 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt
KBSE
2007
IEEE
14 years 1 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
CONCUR
2001
Springer
14 years 5 days ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini
ACSAC
1998
IEEE
13 years 12 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
SAC
2008
ACM
13 years 7 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...