Sciweavers

2270 search results - page 202 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
FMCO
2009
Springer
161views Formal Methods» more  FMCO 2009»
15 years 1 months ago
The How and Why of Interactive Markov Chains
This paper reviews the model of interactive Markov chains (IMCs, for short), an extension of labelled transition systems with exponentially delayed transitions. We show that IMCs a...
Holger Hermanns, Joost-Pieter Katoen
SAFECOMP
2000
Springer
15 years 7 months ago
Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems
Increasingly, the dependability of vehicle based programmable systems is becoming a key feature in ensuring the safety of those in and around the vehicle. The goal of those respons...
Richard Evans, Jonathan D. Moffett
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 10 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
ACSAC
1999
IEEE
15 years 8 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
EUROSYS
2007
ACM
16 years 28 days ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...