Sciweavers

2270 search results - page 148 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ENTCS
2007
120views more  ENTCS 2007»
13 years 9 months ago
Non-Interference Control Synthesis for Security Timed Automata
In this paper, the problem of synthesizing controllers that ensures non interference for multilevel security dense timed discrete event systems modeled by an extension of Timed Au...
Guillaume Gardey, John Mullins, Olivier H. Roux
DSN
2008
IEEE
14 years 3 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
CSFW
1995
IEEE
14 years 16 days ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
ICNS
2006
IEEE
14 years 3 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc
TR
2008
98views more  TR 2008»
13 years 8 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya