Sciweavers

2270 search results - page 117 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
REFSQ
2010
Springer
13 years 10 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...
COMPSAC
2010
IEEE
13 years 5 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
SEFM
2007
IEEE
14 years 3 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
GI
2003
Springer
14 years 2 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
ICRA
1993
IEEE
126views Robotics» more  ICRA 1993»
14 years 1 months ago
Toward a New Intelligent Reactive Controller for Autonomous Mobile Robots
A survey of blackboard robotics applications shows the improvements of blackboard models used in telerobotics and autonomous robots from the use of sequential blackboard in the ro...
Jean-Yves Tigli, Michel Occello, M.-C. Thomas