Sciweavers

2270 search results - page 110 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
JCS
2002
94views more  JCS 2002»
13 years 8 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
ARC
2010
Springer
154views Hardware» more  ARC 2010»
13 years 9 months ago
Perspectives on system identification
: System identification is the art and science of building mathematical models of dynamic systems from observed input-output data. It can be seen as the interface between the real ...
Lennart Ljung
OOPSLA
2000
Springer
14 years 13 days ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
IJCSA
2007
116views more  IJCSA 2007»
13 years 8 months ago
What Enterprise Architecture and Enterprise Systems Usage Can and Can not Tell about Each Other
—There is an increased awareness of the roles that enterprise architecture (EA) and enterprise systems (ES) play in today’s organizations. EA and ES usage maturity models are u...
Maya Daneva, Pascal van Eck
MTSR
2007
Springer
14 years 3 months ago
Exploring aspects of scientific publishing in astrophysics and cosmology: the views of scientists
Scientists in astrophysics and cosmology make much use of the arXiv repository. Concerns raised by scientists in those fields about publication costs and delays, and the transparen...
Panayiota Polydoratou, Martin Moyle