Sciweavers

3638 search results - page 15 / 728
» Distribution chain security
Sort
View
CSFW
1999
IEEE
13 years 12 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
WSC
2000
13 years 9 months ago
Distributed supply chain simulation in GRIDS
Amongst the majority of work done in Supply Chain Simulation, papers have emerged that examine the area of model distribution. The executions of simulations on distributed hosts a...
Rajeev Sudra, Simon J. E. Taylor, Tharumasegaram J...
FMSD
2006
85views more  FMSD 2006»
13 years 7 months ago
Distributed disk-based algorithms for model checking very large Markov chains
In this paper we present data structures and distributed algorithms for CSL model checking-based performance and dependability evaluation. We show that all the necessary computatio...
Alexander Bell, Boudewijn R. Haverkort
ACSAC
2007
IEEE
14 years 2 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...