Sciweavers

45 search results - page 6 / 9
» Enforcing a security pattern in stakeholder goal models
Sort
View
LICS
2006
IEEE
14 years 1 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
INFOCOM
2010
IEEE
13 years 6 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
ECMDAFA
2006
Springer
136views Hardware» more  ECMDAFA 2006»
13 years 11 months ago
Finding a Path to Model Consistency
A core problem in Model Driven Engineering is model consistency achievement: all models must satisfy relationships constraining them. Active consistency techniques monitor and cont...
Gregory de Fombelle, Xavier Blanc, Laurent Rioux, ...
SACMAT
2003
ACM
14 years 24 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ICICS
2003
Springer
14 years 22 days ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...