Sciweavers

537 search results - page 54 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
FM
2005
Springer
125views Formal Methods» more  FM 2005»
14 years 1 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
IEEECIT
2006
IEEE
14 years 1 months ago
A Service Retrieval Model with Enhanced Dominance-Based Rough Sets
As an important part of service-oriented software engineering, service retrieval receives much attention from industry and academia, but which still leaves much to be expected: ho...
Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui T...
KBSE
2007
IEEE
14 years 1 months ago
A framework and tool supports for testing modularity of software design
Modularity is one of the most important properties of a software design, with significant impact on changeability and evolvability. However, a formalized and automated approach i...
Yuanfang Cai, Sunny Huynh, Tao Xie
FSTTCS
2003
Springer
14 years 26 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...