Sciweavers

2270 search results - page 151 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
139
Voted
DASFAA
2010
IEEE
307views Database» more  DASFAA 2010»
15 years 5 months ago
A General Maturity Model and Reference Architecture for SaaS Service
Abstract. In today's dynamic IT environment with increased global competition, enterprises must achieve greater business agility and decrease the TCO (Total Cost of Ownership)...
Seungseok Kang, Jaeseok Myung, Jongheum Yeon, Seon...
151
Voted
ISF
2008
114views more  ISF 2008»
15 years 3 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
166
Voted
EUROSYS
2008
ACM
16 years 19 days ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
137
Voted
ICTAC
2005
Springer
15 years 9 months ago
The Timer Cascade: Functional Modelling and Real Time Calculi
Case studies can significantly contribute towards improving the understanding of formalisms and thereby to their applicability in practice. One such case, namely a cascade of the ...
Raymond T. Boute, Andreas Schäfer
ADAEUROPE
2001
Springer
15 years 8 months ago
Building Formal Requirements Models for Reliable Software
Requirements engineering (RE) is concerned with the elicitation of the goals to be achieved by the system envisioned, the operationalization of such goals into specifications of se...
Axel van Lamsweerde