Sciweavers

2270 search results - page 38 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
IAJIT
2011
13 years 4 days ago
An RFID-based validation system for halal food
: In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the ...
Mohd Nasir, Azah Norman, Shukor Fauzi, Masliyana A...
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
14 years 1 months ago
Evolution of Planning for Wireless Communication Systems
In this paper we provide a detailed and comprehensive survey of proposed approaches for network design, charting the evolution of models and techniques for the automatic planning ...
Roger M. Whitaker, Steve Hurley
MOVEP
2000
167views Hardware» more  MOVEP 2000»
14 years 7 days ago
Model Checking: A Tutorial Overview
We survey principles of model checking techniques for the automatic analysis of reactive systems. The use of model checking is exemplified by an analysis of the Needham-Schroeder p...
Stephan Merz
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 8 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King