Sciweavers

418 search results - page 11 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
SOCO
2005
Springer
14 years 2 months ago
A Model of Components with Non-regular Protocols
Abstract. Behavioral specifications that are integrated into component interfaces are an important means for the correct construction of component-based systems. Currently, such s...
Mario Südholt
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 10 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
FASE
1998
Springer
14 years 1 months ago
Compositional Verification of Reactive Systems Specified by Graph Transformation
A loose semantics for graph transformation rules which has been developed recently is used in this paper for the compositional verification of specifications. The main conceptual t...
Reiko Heckel
CCS
2007
ACM
14 years 3 months ago
An algorithm for the appraisal of assurance indicators for complex business processes
In order to provide certified security services we must provide indicators that can measure the level of assurance that a complex business process can offer. Unfortunately the fo...
Fabio Massacci, Artsiom Yautsiukhin
ADAEUROPE
2007
Springer
14 years 3 months ago
Enhancing Dependability of Component-Based Systems
Abstract. We present an approach for enhancing dependability of component-based software. Functionality related to security, safety and reliability is encapsulated in specific com...
Arnaud Lanoix, Denis Hatebur, Maritta Heisel, Jean...