Sciweavers

2270 search results - page 37 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CSFW
1999
IEEE
14 years 1 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
JTAER
2006
100views more  JTAER 2006»
13 years 8 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
ICCSA
2003
Springer
14 years 1 months ago
Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques
Abstract. In our companion paper [5], we described the optics underlying camera models that have been used in computer graphics, and presented object space techniques for rendering...
Brian A. Barsky, Daniel R. Horn, Stanley A. Klein,...
ECSA
2010
Springer
13 years 8 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
JCS
2002
118views more  JCS 2002»
13 years 8 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...