Sciweavers

537 search results - page 43 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 1 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ATAL
2006
Springer
13 years 11 months ago
Run-time model checking of interaction and deontic models for multi-agent systems
This paper is concerned with the problem of obtaining predictable interactions between groups of agents in open environments when individual agents do not expose their bdi logic. ...
Nardine Osman, David Robertson, Christopher Walton
ASE
2008
102views more  ASE 2008»
13 years 7 months ago
Model driven code checking
Model checkers were originally developed to support the formal verification of high-level design models of distributed system designs. Over the years, they have become unmatched in...
Gerard J. Holzmann, Rajeev Joshi, Alex Groce
EUROMICRO
2000
IEEE
14 years 1 days ago
Formal Coverification of Embedded Systems Using Model Checking
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
SACMAT
2004
ACM
14 years 1 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn