Sciweavers

2270 search results - page 149 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
HICSS
2003
IEEE
159views Biometrics» more  HICSS 2003»
14 years 2 months ago
Application Service Providing as Part of Intelligent Decision Support for Supply Chain Management
A prominent trend in the software industry in the late 1990s was the development of the application service providing business model. Application service providers (ASP)1 offer th...
Tanja Falkowski, Stefan Voß
ARCS
2004
Springer
14 years 2 months ago
Finite-State Modeling, Analysis and Testing of System Vulnerabilities
: Man-machine systems have several desirable properties, as to user friendliness, reliability, safety, security or other global system attributes. The potential for the lack, or br...
Fevzi Belli, Christof J. Budnik, Nimal Nissanke
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 3 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
PADS
2009
ACM
14 years 3 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu