Sciweavers

5475 search results - page 10 / 1095
» Model Driven Security
Sort
View
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
14 years 4 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 3 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
ICSE
1999
IEEE-ACM
14 years 2 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
DAWAK
2009
Springer
13 years 7 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
IEEEARES
2009
IEEE
14 years 4 months ago
Risk-Driven Architectural Decomposition
Thomas Heyman, Riccardo Scandariato, Wouter Joosen