Sciweavers

1875 search results - page 10 / 375
» Modeling the Security of Steganographic Systems
Sort
View
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 4 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
ACSAC
2001
IEEE
14 years 1 months ago
A Security Model for Military Message Systems: Retrospective
Carl E. Landwehr, Constance L. Heitmeyer, John D. ...
CIS
2006
Springer
14 years 1 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
IEEESP
2011
13 years 1 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
QSIC
2007
IEEE
14 years 4 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao