Sciweavers

1875 search results - page 13 / 375
» Modeling the Security of Steganographic Systems
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 2 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 4 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
SACMAT
2009
ACM
14 years 4 months ago
Extending access control models with break-glass
Achim D. Brucker, Helmut Petritsch
IEEEARES
2006
IEEE
14 years 3 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
13 years 11 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...