Sciweavers

2270 search results - page 109 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ICDIM
2007
IEEE
14 years 3 months ago
The selection of CRM systems in financial institutes using the analytic hierarchy
Recently, by changing business circumstances, financial institutes have become interested in customer relationship management (CRM) in order to obtain continuous profit and to kee...
Taeho Hong, Eunmi Kim
FM
2005
Springer
125views Formal Methods» more  FM 2005»
14 years 2 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
NDSS
2003
IEEE
14 years 2 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
WETICE
2003
IEEE
14 years 2 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
CCS
2006
ACM
14 years 18 days ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...