Sciweavers

1875 search results - page 6 / 375
» Modeling the Security of Steganographic Systems
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
14 years 1 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
IEEEARES
2008
IEEE
14 years 4 months ago
Modelling Security Properties in a Grid-based Operating System with Anti-Goals
In this paper, we discuss the use of formal requirementsengineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to repr...
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Bri...
CCS
2001
ACM
14 years 1 months ago
A Chinese wall security model for decentralized workflow systems
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...
AGENTS
2000
Springer
14 years 2 months ago
Integrating visual modeling of agent-based and object-oriented systems
Ralph Depke, Reiko Heckel, Jochen Malte Küste...