Sciweavers

2270 search results - page 34 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
JUCS
2007
116views more  JUCS 2007»
13 years 8 months ago
Model Checking: Software and Beyond
: This paper introduces model checking, originally conceived for checking finite state systems. It surveys its evolution to encompass finitely checkable properties of systems wit...
Edmund M. Clarke, Flavio Lerda
ECOOPWEXCEPTION
2000
Springer
14 years 1 months ago
Action-Oriented Exception Handling in Cooperative and Competitive Concurrent Object-Oriented Systems
The chief aim of this survey is to discuss exception handling models which have been developed for concurrent object systems. In conducting this discussion we rely on the following...
Alexander B. Romanovsky, Jörg Kienzle
AICT
2010
IEEE
240views Communications» more  AICT 2010»
13 years 9 days ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
UML
2005
Springer
14 years 2 months ago
Dynamic Secure Aspect Modeling with UML: From Models to Code
Abstract. Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticip...
Jan Jürjens, Siv Hilde Houmb
HICSS
2009
IEEE
228views Biometrics» more  HICSS 2009»
14 years 3 months ago
Agents of Diffusion - Insights from a Survey of Facebook Users
In times of web 2.0 and its strong focus on user interaction in business models, entrepreneurs and investors of internet businesses often back up their ambitious growth expectatio...
Rebecca Ermecke, Philip Mayrhofer, Stefan Wagner