Sciweavers

537 search results - page 19 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
ECLIPSE
2005
ACM
13 years 9 months ago
An approach to workflow modeling and analysis
— In this paper we present a new approach to workflow analysis. There are efforts to design and verify workflow models using both Activity diagrams and Petri nets. We model the w...
Hemant Kr. Meena, Indradeep Saha, Koushik Kr. Mond...
CBSE
2011
Springer
12 years 7 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
IFIP
2010
Springer
13 years 2 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 9 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
COMPSEC
2010
142views more  COMPSEC 2010»
13 years 4 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto